Conclusion
The resources provided by this paper can provide instructors and
students with information sufficient to begin a discussion on ethical
issues related to computing. This list of resources is, however, by
no means exhaustive. It is our hope that by encouraging the student to
explore these issues, we are at the same time encouraging an evolution
in the computing community's approach to these dilemmas.
Please note: The resources listed in this document are subject to change.
Due to the nature of the Internet, there is no guarantee that any or all
of these sites will be operational at any time. Newsgroups are formed
and abandoned. However, all of the sites and newsgroups mentioned in this
paper were operational when this paper was drafted. Should you find any of
these sites are no longer operational, or any of the newsgroups no longer
exist, please do not panic. This is the nature of the Internet.
© 1995 Sarah Gordon. This document may not be reproduced in whole or in
part, stored in any electronic information system, or otherwise made
available without specific prior express written permission of the author.
All rights reserved.
Bibliography
Denning, Dorothy. Dorothy Denning. "The United States vs. Craig Neidorf".
Communications of the ACM, No. 3 Vol.34 March 1991
Holz, H.J. and Martin, C.D. H.J. Holz and C.D. Martin. "Education and
Society" ed. R. Aiken, Information Processing 92, Volume II, Elsevier
Science Publishers, North Holland 1992. Proceedings IFIP 12th World
Computer Congress, Madrid, Spain. September 7-11, 1992. pp137-143
NET (Nationwide Electronic Tracking). "For Sale, Data About You". Harper's
Magazine, 1992
Stallman, Richard. Richard Stallman. "Why Software Should Be Free". Free
Software Foundation. April 1992
SPA: Software Publishers Association. "Is it O.K. to copy my
Colleague's Software?" SPA. 1994
Sterling, Bruce. Bruce Sterling. The Hacker Crackdown: Law and Disorder
on the Electronic Frontier. Bantam Books. 1992
Stoll, Cliff. Cliff Stoll. The Cuckoo's Egg: Tracking a Spy Through
the Maze of Computer Espionage. Doubleday Books. 1989
Other books of Interest:
Hafner, Katie and Markoff, JOhn. Katie Hafner and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier.
Simon & Schuster. 1991
Forrester, Tom and Morrison, Perry. Tom Forester and Perry Morrison. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing
MIT Press. 1990.
The Knightmare. Secrets of a Super Hacker.
Loompanics Unlimited, 1994
About the Author
Sarah Gordon's work in various areas of IT Security can be found profiled in
various publications including the New York Times, Computer Security Journal
and Virus Bulletin. She is a frequent speaker at such diverse conferences
as those sponsored by NSA/NIST/NCSC and DEFCON. Recently appointed to the
Wildlist Board of Directors, she is actively involved in the development
of anti-virus software test criteria and methods. She may be reached as
[email protected]