Ethics and the Computer Science Curriculum: Resource Guide

Anne Marchant
Copyright © 1996-2000 All Rights Reserved. Note: this page is no longer being regularly maintained.
To be good is noble, To tell others to be good is nobler...and much less trouble
Mark Twain



George Mason University

Responsible Use of Computing Policy

The Security Review Panel

The GMU CERT

GMU Honor Code

CS 105 Computer Ethics and Society Syllabus

Award winning student ethics page

Student Page on Cheating

Internet

Usenet: comp.risks

WWW (General)

ACM Code of Ethics

IEEE Code of Ethics

Software Engineering Code of Ethics

A Yahoo Directory of Ethics references and courses

WWW Ethics Center for Engineering and Science. This is a good place to start.

Homepage for Texas A&M--many useful links

Ethics on the Web, by Paul Martin Lester.

Information System Ethics, edited by David Vance and Arun Rai

Home page for Computer Professionals for Social Responsibility.

Computer Crime Directory. (Includes text of Computer Fraud and Abuse Act.)

Homepage for Centre for Computing and Social Responsibility, DeMontfort University

Homepage for the Centre for Applied Ethics, University of British Columbia.

Ethics Course at William and Mary

CERT (Computer Emergency Response Team)

Homepage for the Electronic Frontier Foundation

Internet Privacy Coalition

Homepage for 6.805/STS085 "Ethics and Law on the Electronic Frontier." A course at MIT covering such topics as: crime, intellectual property, encryption, national security, privacy, freedom of expression.

Homepage for Center for Computer Crime Research, Florida State University.

Homepage for Duke Course, "Ethics and the Internet." Many links to a wide range of ethical and social topics.

Computers, Freedom, and Privacy Video Library (catalogue and order forms.)

CIAC Advisory on Internet Hoaxes

Ten Commandments of Computer Ethics. Computer Ethics Institute.

Papers on the Internet Worm Incident. (Click on the index to find specific papers.)

US Office of Government Ethics

NASA GSFC Ethics Page

Software Engineering on the Web

ISACC99 Conference on Certification

Bibliography

Certification

Gilius, L. Certification for Computing Professionals. McGraw-Hill, 1995.

ANSI ASC Z-1 Committee on Quality Assurance

Ethics

Baase, S. A Gift of Fire. Prentice Hall, 1997.

Bowyer, K. Ethics and Computing. IEEE Computer Society Press, 1996.

"Ten Commandments of Computer Ethics", Computer Ethics Institute Page.

Communications of the ACM. Ethics and Computer Use. 38.12, December, 1995.

Dejoie, R., et al. Ethical Issues in Information Systems. Boyd & Fraser, 1991.

Ermann, M.D. et al. Computers, Ethics, and Society. Oxford University Press, 1990.

Dunlop, C. & Kling, R. Computerization and Controversy. Value Conflicts and Social Choices. Academic Press, 1991. (Covers changes in society, work, privacy, security and reliability, professional responsibility. Over 700 pp.)

Forester, T. & Morrison, P. Computer Ethics. Cautionary Tales and Ethical Dilemmas in Computing. MIT Press, 2nd ed.,1994.

Hauben, M. & Hauben, R. Netizens: On the History and Impact of Usenet and the Internet. IEEE Computer Society Books.

Hodapp, P. Ethics in the Business World. Krieger Publishing, 1994.

Johnson, D.G. Computer Ethics. Prentice Hall, 2nd ed.: 1994. (A nice, "skinny" book. A good survey for under $20.00.)

Johnson, D.G. & Nissenbaum, H. Computer Ethics & Social Values. Prentice Hall, 1995. (A solid textbook, over 700 pp.)

Kizza, J. Ethical and Social Issues in the Information Age. Springer, 1997.

Miethe, T. Whistleblowing at Work. Westview Press, 1999.

ACM/IEEE Codes of Ethics (can be found in appendices of Deborah G. Johnson, Computer Ethics. Prentice Hall, 2nd ed.: 1994).

Security

Anonymous, Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. Sams.net, 1997.

Bacard, A. The Computer Privacy Handbook. Peachpit Press, 1995. (Privacy, encryption, Clipper Chip and PGP.)

Chapman, D. & Zwicky, E. Building Internet Firewalls. O'Reilly and Associates, 1995.

Cheswick, R. & Bellowin, S. "Firewalls," Scientific American. 10/98: 106-107.

Cheswick, R. & Bellowin, S. Firewalls and Internet Security. Addison Wesley, 1994.

Garfinkel, S. & Spafford, G. Practical Unix & Internet Security. O'Reilly & Associates, 1996.

Russell, D. & Gangemi, G. Computer Security Basics. O'Reilly & Associates, 1991.

Firewalls

Firewalls

Unix security

Crime

Barret, D. Bandits on the Information Superhighway. O'Reilly & Associates, 1996.

Chantico Publishing, Co. Combating Computer Crime: Prevention, Detection, Investigation. McGraw-Hill, 1992.

Clark, F., Diliberto, K. Investigating Computer Crime. CRC Press, 1996.

Icove, D.J. Computer Crime: A Crime-fighter's Handbook. O'Reilly & Associates, 1995.

Mendell, R.L. Investigating Computer Crime. Charles C. Thomas, Publisher, 1998.

Parker, D. Fighting Computer Computer Crime. John Wiley & Sons, 1998

Schlegel, K. and Weisburd, D., eds. White Collar Crime Reconsidered. Northwestern University Press, 1992.

Encryption

ACM Crytography study-includes Clipper

Denning, D. Cryptography and Data Security. Addison Wesley, 1983.

Garfinkel, S. Pretty Good Privacy. O'Reilly & Associates, 1994.

Johnson, N. "Steganography and Digital Watermarking," http://isse.gmu.edu/~njohnson/Steganography/

Rivest, R. "The Case against Regulating Encryption Technology," Scientific American. 10/98:116-117.

Schneier, B. Applied Cryptography. J. Wiley and Sons, 1994.

Stinson, D.R. Cryptography Theory and Practice.

Zimmerman, P. "Cryptography for the Internet," Scientific American. 10/98: 110-115.

Zimmerman, P. PGP Source Code and Internals.

Encryption. Homepage for RSA: Rivest, Shamir, and Adleman.

PGP

IBM public key encryption

Digital Privacy

Future

Gibson, W. Neuromancer. Ace Books, 1984.

Gibson, W. Virtual Light. Bantam Books, 1993.

Godwin, M. Cyber rights. Random House, 1998.

Peterson, John L. The Road to 2015. Waite Group Press, 1996.

Stephenson, N. Snow Crash. Bantam Books, 1992.

Hacking/Viruses

Cohen, F. A Short Course on Computer Viruses. J. Wiley & Sons, 1994.

Ferbrache, D. A Pathology of Computer Viruses. Springer-Verlag, 1992.

Hoffman, L. Rogue Programs, Viruses, Worms, and Trojan Horses. Van Nostrand Reinhold, 1990.

Littman, J. The Fugitive Game. Little Brown, 1995.

Ludwig, M. The Little Black Book of Computer Viruses. American Eagle Publications, 1991.

Smith, G. The Virus Creation Labs. American Eagle Publications, 1994.

Sterling, B. The Hacker Crackdown. Bantam Books, 1992

Stoll, C. The Cuckoo's Egg. Pocket Books, 1990.

Information Warfare

Denning, D. Information Warfare and Security. Addison Wesley, 1999.

Schwartau, W. Information Warfare. 2nd. Ed. Thunder's Mouth Press, 1996.

www.infowar.com

Law

ECPA

Best, R.A. Computer Law and Software Protection: a bibliography of crime, liability, abuse, and security, 1984-1992.

Cavazos, E. & Morin, G. Cyberspace and the Law. MIT Press, 1995.

Privacy

Draft of ACM Policy on Privacy

Brin, David. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? 1998.

Diffie, Whitfield and Susan Landau, Privacy on the Line. MIT Press, 1998. (ISBN: 0-262-04167-7)

Gandy, O. The Panoptic Sort. A Political Economy of Personal Information. Westview Press, 1993. (A thoughtful discussion of information, power, and privacy issues.)

Philip E. Agre and Marc Rotenberg, editors, Technology and Privacy: The New Landscape. MIT Press, 1997.

Electronic Privacy Information Center

Personal Privacy and Access to Medical Databases

Privacy Foundation

Risk Assessment/Liability

Casey, S. Set Phasers on Stun: and other True Tales of Design, Technology, and Human Error. 2nd ed. Aegean Press, 1998.

Lewis, H.R. Technological Risk. W.W. Norton, 1990.

Magnuson, R.J. The White-Collar Crime Explosion. How to Protect Yourself and Your Company from Prosecution. McGraw-Hill, 1992.

Neumann, P. Computer-Related Risks. Addison-Wesley, 1995.

Software Quality and Reliability

Les Hatton, L. Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw Hill,1997 (ISBN: 0-07-707640-0).

Yourdan, E. Death March: The Complete Software Developer's Guide to Surviving "Mission Impossible" Projects. Prentice Hall, 1997.

Software Engineering Institute, Capability Maturity Model

Video

The KGB, the Computer and Me. Coronet Film & Video, 1990. (An entertaining dramatization of the "Cuckoo's Egg" story.)