Computer Ethics – References

[Alex Reid – 29-Mar-01/16-Apr-02/1-Mar-06/1-Mar-07/28-Jul-11/5-Aug-12/26-Jul-14/24-Jul-15/6-Aug-16/3-Aug-17 – links checked as at latest date]

 

Codes of Ethics:

 

Australian Computer Society Code of Ethics

<https://www.acs.org.au/content/dam/acs/acs-documents/Code-of-Ethics.pdf>

 

Australian Computer Society Code of Professional Conduct Case Studies

<https://more.acs.org.au/__data/assets/pdf_file/0004/30964/ACS_Ethics_Case_Studies_v2.1.pdf>

 

Australian Computer Society Code of Professional Conduct

<https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf>

 

British Computer Society Code of Conduct

<http://www.bcs.org/category/6030>

 

ACM Code of Ethics and Professional Conduct

<http://www.acm.org/about/code-of-ethics>

 

ACM/IEEE-CS Software Engineering Code of Ethics

<http://www.acm.org/about/se-code/>

 

General Books, Journals and Articles on Ethics:

 

Bynum, Terrel Ward & Rogerson, Simon, eds: Computer Ethics & Professional Responsibility: Introductory Text & Readings, Blackwell, 2004

 

Edgar, Stacey L: Morality and Machines: Perspectives on Computer Ethics, Jones and Bartlett Publishers, 2003

 

Torvalds, Linus, Himanen, Pekka & Castells, Manuel, The Hacker Ethic, Secker & Warburg, 2001

 

Burmeister, Oliver K, Applying the ACS Code of Ethics, ACS Information Age, Feb/Mar 2001, pp54-59 [and in the subsequent 3 issues, Apr/May, Jun/Jul, Aug/Sep 2001]

 

Weckert, John (ed), Computer Ethics, Why Bother?, 2nd Australian Institute of Computer Ethics Conference, Canberra, Australia, Sep 2000 [published as Volume 1 of Conferences in Research and Practice in Information Technology]

<http://crpit.com/Vol1.html>

 

Burmeister, Oliver K, Applying the ACS Code of Ethics, Journal of Research and Practice in Information Technology, May 2000, V32, n2, pp107-119

 

Moor, James H: Reason, Relativity & Responsibility in Computer Ethics, Computers & Society, v28 n1 March 1998, pp14-21

 

Spinello, Richard A: Case Studies in Information and Computer Ethics, Prentice Hall, 1997

 

Willard, Nancy, The Cyberethics Reader, McGraw-Hill, 1997


Ermann, M David, Williams, Mary B, & Shauf, Michele S (eds), Computers, Ethics, and Society, Oxford University Press, 1997

 

Weckert, John & Adeney, Douglas, Computer and Information Ethics, Greenwood Press, 1997

Tavani, Herman T, Metabibliography of Computers, Ethics and Society: An Annotated Bibliography of Bibliographies, Computers and Society, Mar 1997, pp19-21

 

Australian Computer Journal, vol29, no.1, February 1997: Special Issue on Ethics and the Internet.

<https://www.acs.org.au/content/dam/acs/50-years/journals/acj/ACJ-V29-N01-199702.pdf>

 

Koocher, Gerald P, Ethics in Cyberspace, Lawrence Erlbaum Associates, 1996


Tavani, Herman T, The Future of Computers & the Quality of Life: A Computer Ethics Bibliography, Computers and Society, Sep 1996, pp31-37

 

Maner, Walter: Unique Ethical Problems in Information Technology, Science & Engineering Ethics, v2 n2 April 1996, pp137-154

 

Spinello, Richard A: Ethical Aspects of Information Technology, Prentice Hall, 1995

 

Neumann, Peter G, Computer-Related Risks, ACM Press, 1995

 

Landford, D, Practical Computer Ethics, McGraw-Hill, 1995

 

Johnson, Deborah G & Nissenbaum, Helen, Computer Ethics and Social Values, Prentice Hall, 1995

 

Forester, Tom & Morrison, Perry, Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing, 2nd edition, MIT Press, 1994

 

Johnson, D G, Computer Ethics, 2nd edition, Prentice Hall, 1994

Anderson, Ronald, E, Using the New ACM Code of Ethics in Decision Making, Communications of the ACM, Feb 1993, v36, n2, pp98-106

 

Stoll, Clifford, The Cuckoo’s Egg: Tracking a Spy Through a Maze of Computer Espionage, Bodley Head, 1990

 

McFarland, Michael C, Urgency of Ethical Standards Intensifies in Computer Community, IEEE Computer, March 1990, pp77-81 [see also Letters section of June 1990 issue, p6] 1985

 

Mason, R, Four Ethical Issues of the Information Age, MIS Quarterly, v10, n1, 1986, pp5-12

 

Bynum, T W (ed), Computers and Ethics, Blackwell, 1985

 

Cornwall, Hugo, The Hacker’s Handbook, Century Communications Ltd, 1985

 

Parnas, David L, Software Aspects of Strategic Defence Initiative, CACM, 1985, v28, n12, p1326

 

Moor, James, H: What is Computer Ethics?, Metaphilosophy, v16 n4, 1985, pp266-275

 

Levy, Steven, Hackers, Penguin Books, 1984

 

Wiener, Norbert: Some Moral and Technical Consequences of Automation, Science, v131, 1960, pp1355-1358

 

Journal of Ethics and Information Technology

<http://www.springer.com/computer/swe/journal/10676>

 

Computers & Society: Quarterly Publication of ACM SIGCAS (Special Interest Group on Computers and Society)

<http://www.sigcas.org/> or <http://dl.acm.org/citation.cfm?id=J198>

 

Computer Ethics Research Centres:

 

Australian Institute of Computer Ethics

<http://auscomputerethics.com/>

 

The Computer Ethics Institute, Washington, USA

<http://computerethicsinstitute.org>

 

The Ten Commandments of Computer Ethics, Computer Ethics Institute, Washington DC

<http://computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf>

 

The OnLine Ethics Center for Engineering & Science, at the (US) National Academy of Engineering

<http://onlineethics.org/>

 

Software Engineering Ethics Research Institute, East Tennessee State University

<http://seeri.etsu.edu/>

 

Markkula Center for Applied Ethics, Santa Clara University

<https://www.scu.edu/ethics/>

 

ACS Committee on Computer Ethics/Professional Conduct

<https://www.acs.org.au/governance/ethics-committee.html>

[currently dormant]

 

Centre for Computing and Social Responsibility, De Montfort University

<http://www.dmu.ac.uk/research/research-faculties-and-institutes/technology/centre-for-computing-and-social-responsibility/ccsr-home.aspx>

 

IEEE Society on Social Implications of Technology (SSIT)

<http://ieeessit.org/>

 

ACM Special Interest Group on Computers and Society (SIGCAS) <http://www.sigcas.org/>

 

Computer Professionals for Social Responsibility

<http://cpsr.org/>

 

Institute for Certification of Computing Professionals

<http://www.iccp.org/>

 

CERT & National Cyber Awareness System

<http://www.us-cert.gov/ncas>

 

AusCERT - Australian Cyber Emergency Response Team

<https://www.auscert.org.au/>

 

Other More Specific/Topical Articles/Websites:

 

Martha Lane Fox: Technology is a Marvel – Now Let’s Make it Moral, The Guardian, 10-Apr-2017

<https://www.theguardian.com/commentisfree/2017/apr/10/ethical-technology-women-britain-internet>

 

Hope Reese: When your driverless car crashes, who will be responsible? The answer remains unclear, TechRepublic, 7-Sep-2016

< http://www.techrepublic.com/article/when-your-driverless-car-crashes-who-will-be-responsible-the-answer-remains-unclear/>

 

Andy Greenberg: Hackers Fool Tesla S's Autopilot to Hide and Spoof Obstacles, Wired, 4-Aug-2016

<https://www.wired.com/2016/08/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles/>

 

Nick Bostrom: Artificial intelligence: ‘We’re like Children Playing with a Bomb’, The Guardian, 12-Jun-2016

< https://www.theguardian.com/technology/2016/jun/12/nick-bostrom-artificial-intelligence-machine>

 

Kuipers, Benjamin: Towards Morality and Ethics for Robots, AAAI Spring Symposium on Ethical and Moral Considerations in Non-Human Agents, 21-Mar-2016

<https://web.eecs.umich.edu/~kuipers/research/pubs/Kuipers-sss-16.html>

 

Merkel, Robert & Burmeister, Oliver: A Code of Ethics in IT: Just Lip Service or Something with Bite?, The Conversation, 9-Oct-2015

<http://theconversation.com/a-code-of-ethics-in-it-just-lip-service-or-something-with-bite-32807>

 

Brenda Aynsley: The Perils of 'Big Data' Without Ethics, The Australian, 14-Aug-2015

< http://www.theaustralian.com.au/business/business-spectator/the-perils-of-big-data-without-ethics-/news-story/cbb22d224bea9b28ea32d39dfad7668e>

   

Ray Kurzweil: Don’t Fear Artificial Intelligence, 30-Dec-2014

<http://www.kurzweilai.net/dont-fear-artificial-intelligence-by-ray-kurzweil>

 

Security Concerns of Bluetooth Technology, September 2010

<http://www.us-cert.gov/ncas/tips/ST05-015>

 

Bowern, Mike, Codes of Ethics: The Ethics of Making Robots that can Kill, Information Age, Feb/Mar 2007, p62.

 

McDonald, Craig, Codes of Ethics: Governance, Systems and Responsibility, Information Age, Dec/Jan 2006/2007, p54.

 

Mather, Karen, Codes of Ethics: Protecting Whose Interests?, Information Age, Oct/Nov 2006, p38.

 

Lucs, Richard, Ethics: Why Do We Differ?, Information Age, Aug/Sep 2006, p28.

 

Bowern, Mike, Ethics: Part of Being Professional, Information Age, Jun/Jul 2006, p51.

 

Bowern, Mike, Ethics: Quality Management is Personal, Information Age, Feb/Mar 2006, p62.

 

UCITA Alert (27-Mar-06), Software Engineering Ethics Research Institute

<http://seeri.etsu.edu/UCITA/WhitePaper.shtm>

 

Bowern, Mike & Weckert, John, Ethics: When a Team Member Embezzles, Information Age, Jun/Jul 2005, p24.

 

Raymond, Eric Steven, How To Become A Hacker, 2001

<http://www.catb.org/~esr/faqs/hacker-howto.html>

 

Kabay, M E, The Napster Cantata, The K-Files, 2001

<http://www.mekabay.com/ethics/napster.htm>

 

Jacobs, Shannon, Sam Spam the Flimflam Man, Ubiquity, ACM, January 2001

<http://ubiquity.acm.org/article.cfm?id=363118>

 

Secure Digital Music Initiative, September 2000

<http://en.wikipedia.org/wiki/Secure_Digital_Music_Initiative>

 

SDMI Challenge FAQ, Princeton Group, 2000

<http://www.cs.princeton.edu/sip/sdmi/faq.html>

 

Tannenbaum, Robert S, Theoretical Foundations of Multimedia: Some Ethical Concerns, Ubiquity, ACM, August 2000

<http://ubiquity.acm.org/article.cfm?id=347643>

 

Open Source Initiative

<http://www.opensource.org>