-
1
-
-
0003945091
-
-
Houghton Mifflin Company, Boston, Massachusetts
-
The American Heritage Dictionary. Houghton Mifflin Company, Boston, Massachusetts, 1982.
-
(1982)
The American Heritage Dictionary
-
-
-
2
-
-
85037092868
-
Student called “ticking bomb after Internet threat,”
-
Associated Press report, “Student called “ticking bomb” after Internet threat,” The Tampa Tribune, February 11, 1995.
-
(1995)
The Tampa Tribune
-
-
-
3
-
-
85037147180
-
Goodearl and Aldred versus Hughes Aircraft: A modern case study in “whistle blowing,”
-
K. W. Bowyer, Goodearl and Aldred versus Hughes Aircraft: A modern case study in “whistle blowing,” looking.forward. 6 (1998), pp. 2-4.
-
(1998)
Looking.Forward.
, vol.6
, pp. 2-4
-
-
Bowyer, K.W.1
-
4
-
-
85037108006
-
The morality of whistle blowing
-
M. D. Ermann, M. B. Williams, and C. Gutierrez (editors), Oxford University Press, New York
-
S. Bok, “The morality of whistle blowing,” in Computers, Ethics &Society, M. D. Ermann, M. B. Williams, and C. Gutierrez (editors), Oxford University Press, New York, 1990.
-
(1990)
Computers, Ethics &Society
-
-
Bok, S.1
-
6
-
-
85037150617
-
Whistle-blower suit filed against Hughes
-
C. Gewertz, “Whistle-blower suit filed against Hughes,” Los Angeles Times, February 24, 1990.
-
(1990)
Los Angeles Times
, pp. 24
-
-
Gewertz, C.1
-
7
-
-
85037135092
-
Maryland teen fined $5,000 for SAT lawsuit
-
V. T. Jennings, “Maryland teen fined $5,000 for SAT lawsuit,” The Washington Post, June 27, 1992.
-
(1992)
The Washington Post
, pp. 27
-
-
Jennings, V.T.1
-
9
-
-
85037074881
-
Hughes charged with falsifying test data
-
J. Mathews and S. Pearlstein, “Hughes charged with falsifying test data,” The Washington Post, December 13, 1991.
-
(1991)
The Washington Post
, pp. 13
-
-
Mathews, J.1
Pearlstein, S.2
-
10
-
-
85037062377
-
Millionaire donates tuition money for the disabled
-
A. Moore, “Millionaire donates tuition money for the disabled,” The Orlando Sentinel-Tribune, February 27,1992.
-
(1992)
The Orlando Sentinel-Tribune
, pp. 27
-
-
Moore, A.1
-
12
-
-
85037125137
-
FBI sting nabs NASA employees
-
February 23
-
“FBI sting nabs NASA employees,” The Tampa Tribune, February 23, 1994.
-
(1994)
The Tampa Tribune
-
-
-
13
-
-
85037100846
-
Double cross: How not to do business
-
“Double cross: How not to do business,” US News &World Report, July 13,1992.
-
(1992)
US News &World Report
-
-
-
14
-
-
85037068513
-
Two Hughes whistle-blowers to split $891,000
-
Washington D.C
-
H. Weinstein, “Two Hughes whistle-blowers to split $891,000,” Los Angeles Times, Washington D.C. September 11, 1996.
-
(1996)
Los Angeles Times
-
-
Weinstein, H.1
-
16
-
-
0003221919
-
Case Study — The Aircraft Brake Scandal
-
Doubleday and Co., New York
-
K. Vandivicr, “Case Study — The Aircraft Brake Scandal,” in In the Name of Profit, Doubleday and Co., New York. 1972.
-
(1972)
In the Name of Profit
-
-
Vandivicr, K.1
-
17
-
-
84941528691
-
The Failure of Space Shuttle Flight 51-L: Deficiencies in Engineering and Management
-
T.E. Bell. “The Failure of Space Shuttle Flight 51-L: Deficiencies in Engineering and Management,” IEEE Spectrum, Feb., 1987, pp. 36-51.
-
(1987)
IEEE Spectrum
, pp. 36-51
-
-
Bell, T.E.1
-
18
-
-
84921397494
-
Exposing Risks of Nuclear Disaster
-
A.F. Westin, ed., McGraw-Hill, New York
-
P. Faulkner, “Exposing Risks of Nuclear Disaster,” in Whistle Blowing: Loyalty and Dissent in the Corporation, A.F. Westin, ed., McGraw-Hill, New York, 1981.
-
(1981)
Whistle Blowing: Loyalty and Dissent in the Corporation
-
-
Faulkner, P.1
-
19
-
-
12244285387
-
Utilitarianism and Cost/Benefit Analysis: An Essay on the Relevance of Moral Philosophy to Bureaucratic Theory
-
D. Scherer and T. Attig, eds., Prentice Hall, Englewood Cliffs, NJ
-
A. MacIntyre, “Utilitarianism and Cost/Benefit Analysis: An Essay on the Relevance of Moral Philosophy to Bureaucratic Theory,” in Ethics and the Environment, D. Scherer and T. Attig, eds., Prentice Hall, Englewood Cliffs, NJ., 1983.
-
(1983)
Ethics and the Environment
-
-
Macintyre, A.1
-
20
-
-
0004143533
-
-
Prentice Hall, Englewood Cliffs. NJ
-
W. Frankena, Ethics, Prentice Hall, Englewood Cliffs. NJ., 1973.
-
(1973)
Ethics
-
-
Frankena, W.1
-
21
-
-
85037114840
-
Harvard ouster linked to porn; Divinity School dean questioned
-
J. Bandler, “Harvard ouster linked to porn; Divinity School dean questioned. Boston Globe, May 19, 1999.
-
(1999)
Boston Globe
, pp. 19
-
-
Bandler, J.1
-
22
-
-
84976679986
-
Decrypting the Puzzle Palace
-
J. P. Barlow, Decrypting the Puzzle Palace, Communications of the ACM, July 1992, pp. 25-31.
-
(1992)
Communications of the ACM
, pp. 25-31
-
-
Barlow, J.P.1
-
24
-
-
85037090661
-
PCs: Personal, but not private
-
M. Brelis, “PCs: personal, but not private,” Boston Globe, July 7,1999.
-
(1999)
Boston Globe
, pp. 7
-
-
Brelis, M.1
-
27
-
-
85037062318
-
Wire fraud case reveals loopholes in U.S. Laws protecting software
-
C. E. Engler, “Wire fraud case reveals loopholes in U.S. laws protecting software,” The Institute, March 1995.
-
(1995)
The Institute
-
-
Engler, C.E.1
-
28
-
-
0025550181
-
Whistle blowing: Not always a losing game
-
K. Fitzgerald, “Whistle blowing: Not always a losing game,” IEEE Spectrum, December 1990, pp. 49-52.
-
(1990)
IEEE Spectrum
, pp. 49-52
-
-
Fitzgerald, K.1
-
29
-
-
85037120970
-
Sources: Divinity school dean resigned over porn
-
E. Hayward, “Sources: Divinity school dean resigned over porn,” The Boston Herald, May 20, 1999.
-
(1999)
The Boston Herald
, pp. 20
-
-
Hayward, E.1
-
31
-
-
0028484846
-
Crypto policy perspectives
-
S. Landau, et al., “Crypto policy perspectives,” Communications of the ACM, August 1994, pp. 115-121.
-
(1994)
Communications of the ACM
, pp. 115-121
-
-
Landau, S.1
-
32
-
-
85037106690
-
Feds drop case against MIT computer whiz
-
R. Ranalli, “Feds drop case against MIT computer whiz,” The Boston Herald, January 28, 1995.
-
(1995)
The Boston Herald
, pp. 28
-
-
Ranalli, R.1
-
33
-
-
85037084315
-
MIT student is called software piracy plotter
-
J. Ranowski, “MIT student is called software piracy plotter,” The Boston Globe, April 8,1994.
-
(1994)
The Boston Globe
-
-
Ranowski, J.1
-
34
-
-
85037089739
-
MIT student charged in pirate bulletin board
-
April 9
-
“MIT student charged in pirate bulletin board,” The Tampa Tribune, April 9,1994.
-
(1994)
The Tampa Tribune
-
-
-
35
-
-
85037119838
-
Do computer docs need a Hippocratic oath?
-
M. Wylie, “Do computer docs need a Hippocratic oath?,” Newhouse News Service, July 6, 1999.
-
(1999)
Newhouse News Service
-
-
Wylie, M.1
-
36
-
-
34248666540
-
Fuzzy Sets
-
L. A. Zadeh, “Fuzzy Sets,” Information and Control, volume 8, number 3, pp. 338-353,1965.
-
(1965)
Information and Control
, vol.8
, Issue.3
, pp. 338-353
-
-
Zadeh, L.A.1
-
37
-
-
84938560730
-
-
American Medical Association, 1992, 515 North State Street, Chicago, IL 60610
-
Code of medical ethics: current opinions, American Medical Association, 1992, 515 North State Street, Chicago, IL 60610.
-
Code of Medical Ethics: Current Opinions
-
-
-
38
-
-
0000268801
-
Ethical principles of psychologists
-
Ethical principles of psychologists, American Psychologist, March 1990, pp. 390-395.
-
(1990)
American Psychologist
, pp. 390-395
-
-
-
39
-
-
85037154898
-
-
The Institute of Electrical and Electronics Engineers (IEEE), January, 345 East 47th Street, New York, 10017-2394
-
IEEE Policy and Procedures Manual', The Institute of Electrical and Electronics Engineers (IEEE), January 1992, 345 East 47th Street, New York, 10017-2394.
-
(1992)
IEEE Policy and Procedures Manual
-
-
-
40
-
-
0026747551
-
Computer professionals: Moral autonomy and a code of ethics
-
H. C. Luegenbiehl, Computer professionals: moral autonomy and a code of ethics, Journal of Systems and Software, volume 17, 1992, pp. 61-68.
-
(1992)
Journal of Systems and Software
, vol.17
, pp. 61-68
-
-
Luegenbiehl, H.C.1
-
41
-
-
85037087201
-
Amid scandal, NASA studies integrity of degrees awarded to its employees
-
K. Sawyer, “Amid scandal, NASA studies integrity of degrees awarded to its employees,” The Washington Post, July 22, 1991.
-
(1991)
The Washington Post
, pp. 22
-
-
Sawyer, K.1
-
43
-
-
85037111934
-
A professor swapped degrees for contract, university suspects
-
July 12
-
“A professor swapped degrees for contract, university suspects,” The Wall Street Journal, July 12, 1991.
-
(1991)
The Wall Street Journal
-
-
-
44
-
-
85037120893
-
NASA employee accused of plagiarism
-
April 1
-
“NASA employee accused of plagiarism,” The Washington Times, April 1, 1992.
-
(1992)
The Washington Times
-
-
-
46
-
-
77957816312
-
-
Research Center on Computing and Society, Southern Connecticut State University, New Haven, Conn. 06515
-
Bynum, T.W., Maner, W. and Fodor, J. Eds. Software Ownership and Intellectual Property Rights. Research Center on Computing and Society, Southern Connecticut State University, New Haven, Conn. 06515, 1992.
-
Software Ownership and Intellectual Property Rights
, pp. 1992
-
-
Bynum, T.W.1
Maner, W.2
Fodor, J.E.3
-
48
-
-
0004111095
-
-
Addison-Wesley, Inc., Reading, Mass
-
Denning, P.J., Ed. Computers under Attack: Intruders, Worms and Viruses. Addison-Wesley, Inc., Reading, Mass., 1990.
-
(1990)
Computers under Attack: Intruders, Worms and Viruses
-
-
Denning, P.J.1
-
49
-
-
0003631309
-
-
Academic Press, New York, N.Y
-
Dunlop, C. and Kling, R., Eds. Computerization and Controversy: Value Conflicts and Social Choices. Academic Press, New York, N.Y., 1991.
-
(1991)
Computerization and Controversy: Value Conflicts and Social Choices
-
-
Dunlop, C.1
Kling, R.2
-
51
-
-
11744266691
-
Software theft and the problem of intellectual property rights
-
Forester, T. Software theft and the problem of intellectual property rights. Comput. Soc. 20, 1 (Mar. 1990), 2-11.
-
(1990)
Comput. Soc.
, vol.20
, Issue.1
, pp. 2-11
-
-
Forester, T.1
-
52
-
-
0000871676
-
Professional Codes: Why, How, and with What Impact?
-
Frankel, M.S. Professional Codes: Why, How, and with What Impact? J. Bus. Ethics 8 (2 and 3) (1989), 109-116.
-
(1989)
J. Bus. Ethics
, vol.8
, Issue.2-3
, pp. 109-116
-
-
Frankel, M.S.1
-
53
-
-
0025513566
-
Women and computing
-
Frenkel, K.A. Women and computing. Commun. ACM 33, 11 (Nov. 1990), 34-46.
-
(1990)
Commun. ACM
, vol.33
, Issue.11
, pp. 34-46
-
-
Frenkel, K.A.1
-
54
-
-
3343000392
-
Computer ethics: Responsibility regained
-
Gotterbarn, D. Computer ethics: Responsibility regained. National Forum (Summer 1991).
-
(1991)
National Forum
-
-
Gotterbarn, D.1
-
55
-
-
50749133845
-
Editor’s corner
-
Gotterbarn, D. Editor’s corner. J. Syst. Soft. 17 (Jan. 1992), 5-6.
-
(1992)
J. Syst. Soft.
, vol.17
, pp. 5-6
-
-
Gotterbarn, D.1
-
56
-
-
84976737210
-
Protecting statistical databases: A matter of privacy
-
Guynes, C.S. Protecting statistical databases: A matter of privacy. Comput. Soc. 19, 1 (Mar. 1989), 15-23.
-
(1989)
Comput. Soc.
, vol.19
, Issue.1
, pp. 15-23
-
-
Guynes, C.S.1
-
58
-
-
0004197846
-
-
Second Ed. Prentice Hall, Englewood Cliffs, N.J
-
Johnson, D.G. Computer Ethics, Second Ed. Prentice Hall, Englewood Cliffs, N.J., 1993.
-
(1993)
Computer Ethics
-
-
Johnson, D.G.1
-
60
-
-
1642461210
-
-
International Society for Technology in Education, Eugene, Ore
-
Martin, C.D. and Murche-Beyma, E., Eds. In Search of Gender Free Paradigms for Computer Science Education. International Society for Technology in Education, Eugene, Ore., 1992.
-
(1992)
Search of Gender Free Paradigms for Computer Science Education
-
-
Martin, C.D.1
Murche-Beyma, E.2
-
61
-
-
0042500654
-
-
National Academy of Sciences, Washington, D.C
-
National Research Council. Intellectual Property Issues in Software. National Academy of Sciences, Washington, D.C., 1991.
-
(1991)
Intellectual Property Issues in Software
-
-
-
62
-
-
0003899211
-
-
Techology and Business. Wellesley, Mass. QED Information Sciences
-
Parker, D., Swope, S. and Baker, B. Ethical conflicts in information and computer science. Techology and Business. Wellesley, Mass. QED Information Sciences, 1990.
-
(1990)
Ethical Conflicts in Information and Computer Science
-
-
Parker, D.1
Swope, S.2
Baker, B.3
-
63
-
-
0344162414
-
SDI: A violation of professional responsibility
-
Parnas, D.L. SDI: A violation of professional responsibility. Abacus 4, 2 (Winter 1987), 46-52.
-
(1987)
Abacus
, vol.4
, Issue.2
, pp. 46-52
-
-
Parnas, D.L.1
-
64
-
-
0039885292
-
-
Wadsworth, Belmont, Calif
-
Perrolie, J.A. Computers and Social Change: Information, Property, and Power. Wadsworth, Belmont, Calif., 1987.
-
(1987)
Computers and Social Change: Information, Property, and Power
-
-
Perrolie, J.A.1
-
65
-
-
0012751494
-
Conversations and trust in computer interfaces
-
Dunlop and Kling, Eds
-
Perrolie, J. Conversations and trust in computer interfaces. In Computers and Controversy. Dunlop and Kling, Eds., 1991.
-
Computers and Controversy
, pp. 1991
-
-
Perrolie, J.1
-
67
-
-
84976667022
-
Are you obeying copyright law?
-
Salpeter, J. Are you obeying copyright law? Technol. Learning 12, 8 (1992), 12-23.
-
(1992)
Technol. Learning
, vol.12
, Issue.8
, pp. 12-23
-
-
Salpeter, J.1
-
68
-
-
0026638495
-
Are computer hacker break-ins ethical?
-
Spafford, G. Are computer hacker break-ins ethical? J. Syst. Softw. 17 (Jan. 1992).
-
(1992)
J. Syst. Softw
, vol.17
-
-
Spafford, G.1
-
71
-
-
84976766055
-
Newstrack: Losses by numbers
-
R. Fox, “Newstrack: Losses by numbers,” Communications of the ACM, February 1995, p. 11.
-
(1995)
Communications of the ACM
, pp. 11
-
-
Fox, R.1
-
73
-
-
0041990843
-
Sketching a national information warfare defense plan
-
N. Munro, “Sketching a national information warfare defense plan,” Communications of the ACM, November 1996, pp. 15-17.
-
(1996)
Communications of the ACM
, pp. 15-17
-
-
Munro, N.1
-
75
-
-
85037134661
-
Special section on the Craig Neidorf case
-
D. E. Denning, D. B. Parker, S. Levy, E. Spafford, M. Rotenberg, J. J. Bloombecker, R. Stallman, “Special section on the Craig Neidorf case,” Communications of the ACM, March 1991, pp. 24-43.
-
(1991)
Communications of the ACM
, pp. 24-43
-
-
Denning, D.E.1
Parker, D.B.2
Levy, S.3
Spafford, E.4
Rotenberg, M.5
Bloombecker, J.J.6
Stallman, R.7
-
76
-
-
85037166224
-
Passing the bug got him trouble by the megabyte
-
D. J. Scherno, “Passing the bug got him trouble by the megabyte,” The Roanoke Times &World News, November 25, 1993.
-
(1993)
The Roanoke Times &World News
-
-
Scherno, D.J.1
-
78
-
-
0003605887
-
-
Doubleday Publishing, New York
-
C. Stoll, The Cuckoo's Egg. Doubleday Publishing, New York, 1989.
-
(1989)
The Cuckoo's Egg
-
-
Stoll, C.1
-
79
-
-
85037120180
-
Privacy-enhanced electronic maily
-
Bishop, M. Privacy-enhanced electronic mail.y. Inlrrnetw. Res. Exp. 2. 4 (Dec. 1991).
-
(1991)
Inlrrnetw. Res. Exp.
, vol.2
, Issue.4
-
-
Bishop, M.1
-
80
-
-
84976757350
-
Recent changes to privacy-enhanced electronic maily
-
Bishop, M. Recent changes to privacy-enhanced electronic mail.y. Intemetw. Res. Exp. 4. 1 (Mar. 1993).
-
(1993)
Intemetw. Res. Exp.
, vol.4
, Issue.1
-
-
Bishop, M.1
-
89
-
-
0003714171
-
-
FYI 8, RFC 1244, CicNct, 1SI
-
Holbrook, J.P. and Reynolds, J., Eds. Site Security Handbook, FYI 8, RFC 1244, CicNct, 1SI, July 1991.
-
(1991)
Site Security Handbook
-
-
Holbrook, J.P.1
Reynolds, J.2
-
90
-
-
0040268965
-
Internet Privacy Enhanced Mail
-
Kent, S.T. Internet Privacy Enhanced Mail. Commun. ACM 36. 8 (Aug. 1993), 48-61.
-
(1993)
Commun. ACM
, vol.36
, Issue.8
, pp. 48-61
-
-
Kent, S.T.1
-
91
-
-
0018543411
-
Password Security: A Case History
-
Morris, R.T. and Thompson, K. Password Security: A Case History. Commun. ACM 22, 11 (Nov. 1979), 594-597.
-
(1979)
Commun. ACM 22
, vol.11
, pp. 594-597
-
-
Morris, R.T.1
Thompson, K.2
-
92
-
-
5344223949
-
-
RFC 1281, SEI.T1S, Nov
-
Pethia, R.D., Crocker, S.D., and Fraser, B.Y. Guidelines for the secure operation of the Internet. RFC 1281, SEI.T1S, Nov. 1991.
-
Guidelines for the Secure Operation of the Internet
, pp. 1991
-
-
Pethia, R.D.1
Crocker, S.D.2
Fraser, B.Y.3
-
93
-
-
84866620736
-
Computer emergency response
-
P. Denning. Ed., ACM Press, New York
-
Scherlis, W.L., Squires, S.L., and Pethia, R.D. Computer emergency response. In P. Denning. Ed., Computers Under Attack: Intruders. Wonns, and Viruses, ACM Press, New York, 1990, pp. 495-504.
-
(1990)
Computers under Attack: Intruders. Wonns, and Viruses
, pp. 495-504
-
-
Scherlis, W.L.1
Squires, S.L.2
Pethia, R.D.3
-
94
-
-
85037115807
-
-
SRI International Network Information Systems Center. Internet Domain Sttnvy. Jan. 1994.
-
(1994)
Internet Domain Sttnvy
-
-
-
98
-
-
85037140445
-
Employers have the right to read e-mail
-
R. Britt, Employers have the right to read e-mail, The Tampa Tribune, June 8, 1994.
-
(1994)
The Tampa Tribune
-
-
Britt, R.1
-
100
-
-
85037161516
-
Jimmying the Internet, U.S
-
Richard Folkers, Jimmying the Internet, U.S. News and World Report, September 14,1998, pp. 45-46.
-
(1998)
News and World Report
, pp. 45-46
-
-
Folkers, R.1
-
101
-
-
0025448606
-
Social aspects of telecommunications policy
-
J. E. Katz, “Social aspects of telecommunications policy,” IEEE Technology and Society Magazine, June/July 1990, pp. 16-24.
-
(1990)
IEEE Technology and Society Magazine
, pp. 16-24
-
-
Katz, J.E.1
-
102
-
-
0040268965
-
Internet privacy enhanced mail
-
S. T. Kent, Internet privacy enhanced mail, Communications of the ACM, August 1993, pp. 48-60.
-
(1993)
Communications of the ACM
, pp. 48-60
-
-
Kent, S.T.1
-
103
-
-
85037156621
-
Codes, keys and conflicts: Issues in US crypto policy
-
S. Landau, S. Kent, C. Brooks, S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller, P. Neumann, and D. Sobel, “Codes, keys and conflicts: Issues in US crypto policy,” ACM US Public Policy Committee Report, June 1994. (ftp://info.acm.org/reports/acm_ crypto_study/)
-
(1994)
ACM US Public Policy Committee Report
-
-
Landau, S.1
Kent, S.2
Brooks, C.3
Charney, S.4
Denning, D.5
Diffie, W.6
Lauck, A.7
Miller, D.8
Neumann, P.9
Sobel, D.10
-
105
-
-
85037148426
-
House, Senate pass wiretap legislation
-
J. A. Osuna, House, Senate pass wiretap legislation, Computing Research News, November 1994, pp. 7-8.
-
(1994)
Computing Research News
, pp. 7-8
-
-
Osuna, J.A.1
-
106
-
-
85037156112
-
Digital disclosure needs a new privacy ethic
-
“Digital disclosure needs a new privacy ethic,” PC Week, September 21, 1992.
-
(1992)
PC Week
-
-
-
107
-
-
85037104854
-
A step closer to era of ID cards
-
M. Puente, “A step closer to era of ID cards,” USA Today, August 31, 1994.
-
(1994)
USA Today
-
-
Puente, M.1
-
108
-
-
85037141084
-
Code breaking: Privacy on parade
-
C. Reed, “Code breaking: privacy on parade,” The Guardian, May 26, 1994.
-
(1994)
The Guardian
-
-
Reed, C.1
-
109
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, February 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
110
-
-
85037072776
-
-
U.S. Supreme Court, Olmstead v. U.S., 277 U.S. 438
-
U.S. Supreme Court, Olmstead v. U.S., 277 U.S. 438, 1928. Online version available at www.findlaw.com.
-
(1928)
-
-
-
111
-
-
85037086324
-
-
V U.S. Supreme Court, Katz v. U.S., 389 U.S. 347
-
V U.S. Supreme Court, Katz v. U.S., 389 U.S. 347, 1967. Online version available at www.findlaw.com.
-
(1967)
-
-
-
112
-
-
0024034262
-
Pinning defense hopes on the Aegis
-
J. A. Adam, “Pinning defense hopes on the Aegis,” IEEE Spectrum, June 1988, pp. 24-27.
-
(1988)
IEEE Spectrum
, pp. 24-27
-
-
Adam, J.A.1
-
113
-
-
30244446421
-
Survey of software standards shows diversity
-
P. V. Bhansali, “Survey of software standards shows diversity,” Computer, January 1993, pp. 88-89.
-
(1993)
Computer
, pp. 88-89
-
-
Bhansali, P.V.1
-
114
-
-
84877488773
-
Tiny bug caused phone blackouts
-
J. Burgess, “Tiny bug caused phone blackouts,” The Washington Post, July 10, 1991.
-
(1991)
The Washington Post
-
-
Burgess, J.1
-
115
-
-
84910744293
-
Three Mile Island and the future of nuclear power
-
Special issue: “Three Mile Island and the future of nuclear power,” IEEE Spectrum, November 1979.
-
(1979)
IEEE Spectrum
-
-
-
118
-
-
0022730231
-
Software safety: Why, what and how
-
N. G. Leveson, “Software safety: Why, what and how,” ACM Computing Surveys, June 1986, pp. 125-163.
-
(1986)
ACM Computing Surveys
, pp. 125-163
-
-
Leveson, N.G.1
-
119
-
-
0026104017
-
Software safety in embedded computer systems
-
N. G. Leveson, “Software safety in embedded computer systems,” Communications of the ACM, February 1991, pp. 34-46.
-
(1991)
Communications of the ACM
, pp. 34-46
-
-
Leveson, N.G.1
-
120
-
-
84976723958
-
Validation of ultrahigh dependability for software-based systems
-
B. Littlewood and L. Stringini, “Validation of ultrahigh dependability for software-based systems,” Communications of the ACM, November 1993, pp. 69-80.
-
(1993)
Communications of the ACM
, pp. 69-80
-
-
Littlewood, B.1
Stringini, L.2
-
121
-
-
0003928923
-
-
(second edition). Signet Books, New York
-
D. H. Meadows, D. L. Meadows, J. Randers, and W. W. Behrens, The Limits to Growth (second edition). Signet Books, New York, 1975.
-
(1975)
The Limits to Growth
-
-
Meadows, D.H.1
Meadows, D.L.2
Randers, J.3
Behrens, W.W.4
-
122
-
-
0012058594
-
Commentary: Human errors and the design of computer systems
-
D. A. Norman, “Commentary: Human errors and the design of computer systems,” Communications of the ACM, January 1990, pp. 4-7.
-
(1990)
Communications of the ACM
, pp. 4-7
-
-
Norman, D.A.1
-
124
-
-
85037142064
-
Computer errors blamed in cancer deaths
-
“Computer errors blamed in cancer deaths,” The Tampa Tribune, September 30,1993.
-
(1993)
The Tampa Tribune
-
-
-
126
-
-
84976845894
-
Interface specifications for the SCR (A-7E) application data types module
-
Clements, P., Faulk, S., and Pamas, D. Interface specifications for the SCR (A-7E) application data types module. NRL Rep. 8734. August 23. 1983.
-
(1983)
NRL Rep. 8734
-
-
Clements, P.1
Faulk, S.2
Pamas, D.3
-
127
-
-
0022614341
-
Certifying the reliability of software
-
Currit, P.A., Dyer, M., and Mills, H.D. Certifying the reliability of software. IEEE Trans. Softw. Eng. SE-12, 1 (Jan. 1986).
-
(1986)
IEEE Trans. Softw. Eng
, vol.SE-12
, pp. 1
-
-
Currit, P.A.1
Dyer, M.2
Mills, H.D.3
-
128
-
-
0018918712
-
New techniques and their applications
-
Specifying software requirements for complex systems
-
Heninger, K. Specifying software requirements for complex systems: New techniques and their applications. IEEE Trans. Softw. Eng. SE-6. (Jan. 1980). 2-13.
-
(1980)
IEEE Trans. Softw. Eng. SE-6
, pp. 2-13
-
-
Heninger, K.1
-
129
-
-
0019624863
-
Using documentation as a software design medium
-
Hester, S.D., Parnas, D.L., and Utter, D.F. Using documentation as a software design medium. Bell Syst. Tech. J. 60, 8 (Oct. 1981), 1941-1977.
-
(1981)
Bell Syst. Tech. J.
, vol.60
, Issue.8
, pp. 1941-1977
-
-
Hester, S.D.1
Parnas, D.L.2
Utter, D.F.3
-
130
-
-
0022581573
-
An experimental evaluation of the assumption of independence in multi-version programming
-
Knight, J.C., and Leveson, N.G. An experimental evaluation of the assumption of independence in multi-version programming. IEEE Trans. Softw. Eng. SE-12, 1 (Jan. 1986). 96-109.
-
(1986)
IEEE Trans. Softw. Eng
, vol.SE-12
, Issue.1
, pp. 96-109
-
-
Knight, J.C.1
Leveson, N.G.2
-
132
-
-
0022730231
-
Oftware safety: Why what and how
-
S, Surveys
-
Leveson, N. Software safety: Why. what and how. ACM Comp. Surveys 18, 2 (June 1986). 125-163.
-
(1986)
ACM Comp
, vol.18
, Issue.2
, pp. 125-163
-
-
Leveson, N.1
-
133
-
-
0023532256
-
Engineering discipline for software procurement
-
Georgetown University. Washington. D.C
-
Mills, H.D. Engineering discipline for software procurement. COMPASS 87—Computer Assurance. June 29-July 3.1987. Georgetown University. Washington. D.C.
-
(1987)
COMPASS 87—Computer Assurance
-
-
Mills, H.D.1
-
134
-
-
0016440955
-
The new math of computer programming
-
Mills, H.D. The new math of computer programming. Commun. ACM 18, 1 (Jan. 1975). 43-48.
-
(1975)
Commun. ACM
, vol.18
, Issue.1
, pp. 43-48
-
-
Mills, H.D.1
-
135
-
-
0039688909
-
-
Allyn and Bacon. Inc
-
Mills, H.D., Basili, V.R., Gannon, J.D., and Hamlet, R.G. Principles of Computer Programming—A Mathematical Approach. Allyn and Bacon. Inc., 1987.
-
Principles of Computer Programming—A Mathematical Approach
-
-
Mills, H.D.1
Basili, V.R.2
Gannon, J.D.3
Hamlet, R.G.4
-
136
-
-
0023363063
-
A formal approach to software error removal
-
Mills, H.D., and Dyer, M. A formal approach to software error removal. J. Sysf. Softw. (1987).
-
(1987)
J. Sysf. Softw
-
-
Mills, H.D.1
Dyer, M.2
-
137
-
-
0004016309
-
-
Addison-Wesley, Reading. Mass
-
Mills, H.D., Linger, R.C., and Witt, B.I. Structured Programming: Theory and Practice. Addison-Wesley, Reading. Mass., 1979.
-
(1979)
Structured Programming: Theory and Practice
-
-
Mills, H.D.1
Linger, R.C.2
Witt, B.I.3
-
138
-
-
84915244227
-
Abstract interface specifications for the A-7E device interface module
-
Parker, A., Heninger, K., Parnas, D., and Shore, J. Abstract interface specifications for the A-7E device interface module. NRL Memo. Rep. 4385. November 20.1980.
-
(1980)
NRL Memo. Rep. 4385
-
-
Parker, A.1
Heninger, K.2
Parnas, D.3
Shore, J.4
-
139
-
-
0025209634
-
Education for computing professionals
-
Parnas, D.L. Education for computing professionals. IEEE Comp. 23.1 (Jan. 1990). 17-22.
-
(1990)
IEEE Comp
, vol.23
, Issue.1
, pp. 17-22
-
-
Parnas, D.L.1
-
140
-
-
84946967934
-
How and why to fake it
-
A rational design process
-
Parnas, D.L., and Clements, P.C. A rational design process: How and why to fake it. IEEE Trans. Softw. Eng. SE-12, 2 (Feb. 1986). 251-257.
-
(1986)
IEEE Trans. Softw. Eng
, vol.SE-12
, Issue.2
, pp. 251-257
-
-
Parnas, D.L.1
Clements, P.C.2
-
141
-
-
0003793975
-
Software requirements for the A-7E aircraft
-
Parnas, D.L., Heninger, K., Kallander, D., and Shore, J. Software requirements for the A-7E aircraft. NRL Rep. 3876. November 1978.
-
(1978)
NRL Rep. 3876
-
-
Parnas, D.L.1
Heninger, K.2
Kallander, D.3
Shore, J.4
-
142
-
-
0004519405
-
The Track assertion method of module-interface specification
-
Queen's University, TRIO (Telecommunications Research Institute of Ontario
-
Parnas, D.L., and Wang, Y. The Track assertion method of module-interface specification. Tech. Rep. 89-261, Queen's University, TRIO (Telecommunications Research Institute of Ontario). October 1989.
-
(1989)
Tech. Rep. 89-261
-
-
Parnas, D.L.1
Wang, Y.2
-
145
-
-
0003335504
-
Report on the Therac-25
-
Kingston, Ont., Canada, May 7
-
J.A. Rawlinson, “Report on the Therac-25," OCTRF/OCI Physicists Meeting, Kingston, Ont., Canada, May 7,1987.
-
(1987)
OCTRF/OCI Physicists Meeting
-
-
Rawlinson, J.A.1
-
146
-
-
0040340912
-
An Application of Fault Tree Analysis to Safety-Critical Software at Ontario Hydro
-
W.C. Bowman et al., “An Application of Fault Tree Analysis to Safety-Critical Software at Ontario Hydro.” Coni Probabilistic Safety Assessment and Management, 1991.
-
(1991)
Coni Probabilistic Safety Assessment and Management
-
-
Bowman, W.C.1
-
147
-
-
0003335504
-
Report on the Therac-25
-
Kingston, Ont., Canada. May 7
-
J.A. Rawlinson. “Report on the Therac-25,” OCTRF/OCI Physicists Meeting, Kingston, Ont., Canada. May 7,1987.
-
(1987)
OCTRF/OCI Physicists Meeting
-
-
Rawlinson, J.A.1
-
148
-
-
0344757723
-
What Do the Simple Folk Do?: Software Safety in the Cottage Industry
-
F. Houston. “What Do the Simple Folk Do?: Software Safety in the Cottage Industry,” IEEE Computers in Medicine Conf 1985.
-
(1985)
IEEE Computers in Medicine Conf
-
-
Houston, F.1
-
150
-
-
85037095893
-
-
US Federal Food and Drug Administration
-
M. Kivel, ed., Radiological Health Bulletin, Vol. XX, No. 8. US Federal Food and Drug Administration. Dec. 1986.
-
(1986)
Radiological Health Bulletin
, vol.20
, Issue.8
-
-
Kivel, M.1
-
153
-
-
0021491641
-
Risk in a Free Society
-
W.D. Ruckelshaus. “Risk in a Free Society,” Risk Analysis, Vol. 4, No. 3,1984, pp. 157-162.
-
(1984)
Risk Analysis
, vol.4
, Issue.3
, pp. 157-162
-
-
Ruckelshaus, W.D.1
-
154
-
-
84944987039
-
The Control of Major Hazards: TTie Advisory Committee's Third and Final Report
-
Oyez Scientific and Technical Services and Authors, London
-
E. A. Ryder. “The Control of Major Hazards: TTie Advisory Committee's Third and Final Report.” Transcript of Conf European Major Hazards, Oyez Scientific and Technical Services and Authors, London. 1984.
-
(1984)
Transcript of Conf European Major Hazards
-
-
Ryder, E.A.1
-
155
-
-
0022730231
-
Software Safety: Why, What, and How
-
N.G. Leveson. “Software Safety: Why, What, and How,” ACM Computing Surveys. Vol. 18. No. 2. June 1986, pp. 25-69.
-
(1986)
ACM Computing Surveys
, vol.18
, Issue.2
, pp. 25-69
-
-
Leveson, N.G.1
-
157
-
-
8744272747
-
The Challenger disaster: Moral responsibility and the working engineer
-
Chapter 1, D. Johnson (editor), Prentice-Hall
-
R. M. Boisjoly, “The Challenger disaster: moral responsibility and the working engineer,” Chapter 1, pp. 6-14, in Ethical Issues in Engineering, D. Johnson (editor), Prentice-Hall, 1991.
-
(1991)
Ethical Issues in Engineering
, pp. 6-14
-
-
Boisjoly, R.M.1
-
158
-
-
85037108006
-
The morality of whistle blowing
-
M. D. Ermann, M. B. Williams, and C. Gutierrez (editors), Oxford University Press, New York
-
S. Bok, “The morality of whistle blowing,” in Computers, Ethics &Society, M. D. Ermann, M. B. Williams, and C. Gutierrez (editors), Oxford University Press, New York, 1990.
-
(1990)
Computers, Ethics &Society
-
-
Bok, S.1
-
159
-
-
85037169268
-
GE fights legality of whistle blower law
-
M. Boyer, “GE fights legality of whistle blower law,” The Cincinnati Enquirer, November 1, 1993.
-
(1993)
The Cincinnati Enquirer
-
-
Boyer, M.1
-
160
-
-
29644433090
-
Ethical responsibilities of engineers in large organizations: The Pinto Case
-
Chapter 15, D. Johnson (editor), Prentice-Hall, Englewood Cliffs, NJ
-
Ethical responsibilities of engineers in large organizations: The Pinto Case, Chapter 15, pp. 175-186, in Ethical Issues in Engineering, D. Johnson (editor), Prentice-Hall, Englewood Cliffs, NJ, 1991.
-
(1991)
Ethical Issues in Engineering
, pp. 175-186
-
-
-
161
-
-
0027434782
-
On being a whistle blower: The Needleman case
-
C. Ernhart, S. Scarr, and D. Geneson, “On being a whistle blower: The Needleman case,” Ethics and Behaviour, volume 3, number 1 (1993), pp. 73-94.
-
(1993)
Ethics and Behaviour
, vol.3
, Issue.1
, pp. 73-94
-
-
Ernhart, C.1
Scarr, S.2
Geneson, D.3
-
162
-
-
85037096758
-
Companies try to put lid on whistle blowers
-
A. Epstein, “Companies try to put lid on whistle blowers,” The Tampa Tribune-Times, February 20, 1994.
-
(1994)
The Tampa Tribune-Times
-
-
Epstein, A.1
-
163
-
-
84955021766
-
An outsiders inside view of the Challenger inquiry,”
-
R. P. Feynman, “An outsider’s inside view of the Challenger inquiry,” Physics Today, February 1988, pp. 26-37.
-
(1988)
Physics Today
, pp. 26-37
-
-
Feynman, R.P.1
-
164
-
-
85037084714
-
Former GE employee gets reward
-
W. E. Gibson, “Former GE employee gets reward,” The Tampa Tribune, December 21,1994.
-
(1994)
The Tampa Tribune
-
-
Gibson, W.E.1
-
165
-
-
0027496189
-
Questions of scientific responsibility: The Baltimore case
-
S. Lange, “Questions of scientific responsibility: The Baltimore case,” Ethics and Behaviour, volume 3, number 1 (1993), pp. 3-72.
-
(1993)
Ethics and Behaviour
, vol.3
, Issue.1
, pp. 3-72
-
-
Lange, S.1
-
166
-
-
85037112477
-
GE whistle blower receives record $13.4 million award
-
December 5
-
J. Mintz, “GE whistle blower receives record $13.4 million award,” The Washington Post, December 5, 1992.
-
(1992)
The Washington Post
-
-
Mintz, J.1
-
167
-
-
85037152940
-
Whistle blowers windfall: Millions,”
-
D. Moss, “Whistle blower’s windfall: Millions,” USA Today, July 30, 1992.
-
(1992)
USA Today
-
-
Moss, D.1
-
168
-
-
0027359938
-
Reply to Ernhart, Scarr, and Geneson
-
H. Needleman, “Reply to Ernhart, Scarr, and Geneson,” Ethics and Behaviour, volume 3, number 1 (1993), pp. 95-102.
-
(1993)
Ethics and Behaviour
, vol.3
, Issue.1
, pp. 95-102
-
-
Needleman, H.1
-
169
-
-
85037100385
-
Whistle blowers live lifestyles of the rich
-
“Whistle blowers live lifestyles of the rich,” The Orlando Sentinel, February 20, 1994.
-
(1994)
The Orlando Sentinel
-
-
-
170
-
-
0344162414
-
Professional responsibility to blow the whistle on SDI
-
Winter, Springer-Verla
-
D. L. Parnas, “Professional responsibility to blow the whistle on SDI,” Abacus, Winter 1987, pp. 46-52, Springer-Verlag.
-
(1987)
Abacus
, pp. 46-52
-
-
Parnas, D.L.1
-
171
-
-
85037069916
-
GE pleads guilty to fraud in engine sales to Israel
-
S. Pearlstein and P. Farhi, “GE pleads guilty to fraud in engine sales to Israel,” The Washington Post, July 23, 1992.
-
(1992)
The Washington Post
-
-
Pearlstein, S.1
Farhi, P.2
-
172
-
-
0009421938
-
Knowing how to blow the whistle
-
T. S. Perry, “Knowing how to blow the whistle,” IEEE Spectrum, September 1981, pp. 56-61.
-
(1981)
IEEE Spectrum
, pp. 56-61
-
-
Perry, T.S.1
-
173
-
-
85037124006
-
-
personal communication
-
J. R. Philips, personal communication.
-
-
-
Philips, J.R.1
-
174
-
-
0019018848
-
Dos and Don’ts for whistle blowers: Planning for trouble,”
-
P. Raven-Hansen, “Do’s and Don’ts for whistle blowers: Planning for trouble,” Technology Review, May 1980, pp. 34-44.
-
(1980)
Technology Review
, pp. 34-44
-
-
Raven-Hansen, P.1
-
175
-
-
85037069622
-
Phony work, greedy billing ran for years
-
G. Rhodes, “Phony work, greedy billing ran for years,” The Cincinnati Post, June 27, 1992.
-
(1992)
The Cincinnati Post
-
-
Rhodes, G.1
-
176
-
-
0027422706
-
Whistle blowing: A very unpleasant avocation
-
Whistle Blowing and Scientific Misconduct, Lawrence Erlbaum Associates
-
R. Sprague, “Whistle blowing: A very unpleasant avocation,” Ethics and Behaviour, special issue on Whistle Blowing and Scientific Misconduct, volume 3, number 1 (1993), Lawrence Erlbaum Associates.
-
(1993)
Ethics and Behaviour
, vol.3
, Issue.1
-
-
Sprague, R.1
-
177
-
-
85037139113
-
Former GE executive from Florida pleads guilty in military aid scheme
-
Tuesday, July 19
-
Former GE executive from Florida pleads guilty in military aid scheme, The Tampa Tribune, Tuesday, July 19, 1994.
-
(1994)
The Tampa Tribune
-
-
-
180
-
-
0024733637
-
Whistle blowing—somebody has to take a stand
-
L. W. Zelby, “Whistle blowing—somebody has to take a stand,” IEEE Technology and Society Magazine, September 1989, pp. 4-6.
-
(1989)
IEEE Technology and Society Magazine
, pp. 4-6
-
-
Zelby, L.W.1
-
181
-
-
85037144518
-
Feds find illegal software in raid
-
J. Bernstein, “Feds find illegal software in raid,” Newsday, Friday, October 30, 1992.
-
(1992)
Newsday
-
-
Bernstein, J.1
-
182
-
-
85037158896
-
SPA Raids Long Island Firm
-
Thursday, October 29
-
“SPA Raids Long Island Firm,” Business Wire, Thursday, October 29, 1992.
-
(1992)
Business Wire
-
-
-
183
-
-
85037093336
-
Patents for software, U.S. Court says yes
-
B. Carlson, “Patents for software, U.S. court says yes,” Computer, September 1994, p. 92.
-
(1994)
Computer
, pp. 92
-
-
Carlson, B.1
-
184
-
-
84943680010
-
Trend is toward less copyright protection
-
J. P. Costello, “Trend is toward less copyright protection,” IEEE Software, September 1993, pp. 92-93.
-
(1993)
IEEE Software
, pp. 92-93
-
-
Costello, J.P.1
-
185
-
-
85037085374
-
U.S. Loses ground in crackdown
-
J. Cox, “U.S. loses ground in crackdown,” USA Today, March 8, 1993.
-
(1993)
USA Today
-
-
Cox, J.1
-
186
-
-
85037101191
-
Is the patent office correctly examining computer-related patents?
-
I. H. Donner, “Is the patent office correctly examining computer-related patents?” Part 2, Computer, January 1995, pp. 93-94.
-
(1995)
Computer
, pp. 93-94
-
-
Donner, I.H.1
-
187
-
-
71849116920
-
Is the patent office correctly examining computer-related patents?
-
I. H. Donner, “Is the patent office correctly examining computer-related patents?” Part 1, Computer, December 1994, pp. 78-79.
-
(1994)
Computer
, pp. 78-79
-
-
Donner, I.H.1
-
188
-
-
0028481471
-
Patent, copyright and trade secret protection for software
-
S. Donovan, “Patent, copyright and trade secret protection for software,” IEEE Potentials, August/September 1994, pp. 20-24.
-
(1994)
IEEE Potentials
, pp. 20-24
-
-
Donovan, S.1
-
189
-
-
85037135867
-
Trade secrets, patents and morality
-
D. G. Johnson, editor, Prentice-Hal
-
R. E. Frederick and M. Snoeyenbos, Trade secrets, patents and morality in Ethical Issues in Engineering, D. G. Johnson, editor, Prentice-Hall, pp. 291-297.
-
Ethical Issues in Engineering
, pp. 291-297
-
-
Frederick, R.E.1
Snoeyenbos, M.2
-
191
-
-
85037063076
-
ACM Forum: Patent war continues
-
P. Heckei, E. R. Yoches, “ACM Forum: Patent war continues,” Communications of the ACM, November 1992, pp. 20-22, 111.
-
(1992)
Communications of the ACM
, vol.111
, pp. 20-22
-
-
Heckei, P.1
Yoches, E.R.2
-
192
-
-
0026875441
-
Debunking the software patent myths
-
P. Heckel, “Debunking the software patent myths,” Communications of the ACM, June 1992, pp. 121-140.
-
(1992)
Communications of the ACM
, pp. 121-140
-
-
Heckel, P.1
-
194
-
-
0024078901
-
Software protection under patent and copyright
-
J. S. Iandiorio, “Software protection under patent and copyright,” IEEE Technology and Society Magazine, September 1988, pp. 9-10.
-
(1988)
IEEE Technology and Society Magazine
, pp. 9-10
-
-
Iandiorio, J.S.1
-
195
-
-
0004197846
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
D. G. Johnson, Computer Ethics, Prentice-Hall, Englewood Cliffs, NJ, 1985.
-
(1985)
Computer Ethics
-
-
Johnson, D.G.1
-
196
-
-
14944361100
-
The law on reverse engineering
-
J. G. Rauch, “The law on reverse engineering,” IEEE Spectrum, August 1993, pp. 47-48.
-
(1993)
IEEE Spectrum
, pp. 47-48
-
-
Rauch, J.G.1
-
197
-
-
85037082170
-
ACM Forum: The continued debate on software patents
-
D. M. Ritchie, E. Vetillard, B. E. Hayden, S. L. Sanders, R. Stallman, and S. Garfinkel, “ACM Forum: The continued debate on software patents,” Communications of the ACM, June 1992, pp. 13-16.
-
(1992)
Communications of the ACM
, pp. 13-16
-
-
Ritchie, D.M.1
Vetillard, E.2
Hayden, B.E.3
Sanders, S.L.4
Stallman, R.5
Garfinkel, S.6
-
198
-
-
85037136503
-
The look and feel issue: The copyright law on trial
-
Chapter 24, M. D. Ermann, M. B. Williams and C. Gutierrez (editors), Oxford University Press, New York
-
W. L. Rosch, “The look and feel issue: the copyright law on trial,” Chapter 24 in Computers, Ethics and Society, M. D. Ermann, M. B. Williams and C. Gutierrez (editors), Oxford University Press, New York, 1990.
-
(1990)
Computers, Ethics and Society
-
-
Rosch, W.L.1
-
199
-
-
85037062823
-
Company going after AutoCAD software pirates in the bay area
-
F. Ruiz, “Company going after AutoCAD software pirates in the bay area,” The Tampa Tribune, June 1, 1992.
-
(1992)
The Tampa Tribune
-
-
Ruiz, F.1
-
200
-
-
0028485390
-
Self plagiarism or fair use?
-
P. Samuelson, “Self plagiarism or fair use?” Communications of the ACM, August 1994, pp. 21-25.
-
(1994)
Communications of the ACM
, pp. 21-25
-
-
Samuelson, P.1
-
201
-
-
0027962062
-
Copyrights fair use doctrine and digital data,”
-
P. Samuelson, “Copyright’s fair use doctrine and digital data,” Communications of the ACM, January 1994, pp. 21-27.
-
(1994)
Communications of the ACM
, pp. 21-27
-
-
Samuelson, P.1
-
202
-
-
84976804005
-
Computer programs and copyrights fair use doctrine,”
-
P. Samuelson, “Computer programs and copyright’s fair use doctrine,” Communications of the ACM, September 1993, pp. 19-25.
-
(1993)
Communications of the ACM
, pp. 19-25
-
-
Samuelson, P.1
-
203
-
-
84976819169
-
The ups and downs of look and feel
-
P. Samuelson, “The ups and downs of look and feel,” Communications of the ACM, April 1993, pp. 29-35.
-
(1993)
Communications of the ACM
, pp. 29-35
-
-
Samuelson, P.1
-
204
-
-
0026923828
-
Updating the copyright look and feel lawsuits
-
P. Samuelson, “Updating the copyright look and feel lawsuits,” Communications of the ACM, September 1992, pp. 25-31.
-
(1992)
Communications of the ACM
, pp. 25-31
-
-
Samuelson, P.1
-
205
-
-
85037082763
-
ACM Forum: Once again, patents
-
P. Samuelson, J. Stern, J. P. Kesselman, C. T. Mathews, and R. Hill, “ACM Forum: Once again, patents,” Communications of the ACM, October 1992, pp. 15-19.
-
(1992)
Communications of the ACM
, pp. 15-19
-
-
Samuelson, P.1
Stern, J.2
Kesselman, J.P.3
Mathews, C.T.4
Hill, R.5
-
206
-
-
84976829145
-
Developments on the intellectual property front
-
P. Samuelson, M. Denber, and R. J. Glushko, “Developments on the intellectual property front,” Communications of the ACM, June 1992, pp. 33-39.
-
(1992)
Communications of the ACM
, pp. 33-39
-
-
Samuelson, P.1
Denber, M.2
Glushko, R.J.3
-
207
-
-
0025513571
-
How to interpret the Lotus decision (And how not to)
-
P. Samuelson, “How to interpret the Lotus decision (and how not to),” Communications of the ACM, November 1990, pp. 27-33.
-
(1990)
Communications of the ACM
, pp. 27-33
-
-
Samuelson, P.1
-
208
-
-
84976763700
-
Should algorithms be patented?
-
P. Samuelson, “Should algorithms be patented?” Communications of the ACM, August 1990, pp. 23-27.
-
(1990)
Communications of the ACM
, pp. 23-27
-
-
Samuelson, P.1
-
211
-
-
85037171849
-
Code of ethics reconsidered
-
G. L. Steele, D. Hillis, R. Stallman, G. J. Sussman, M. Minsky, J. McCarthy, J. Backus, and F. J. Corbato, “Code of ethics reconsidered,” Communications of the ACM, July 1993, pp. 17-18.
-
(1993)
Communications of the ACM
, pp. 17-18
-
-
Steele, G.L.1
Hillis, D.2
Stallman, R.3
Sussman, G.J.4
Minsky, M.5
McCarthy, J.6
Backus, J.7
Corbato, F.J.8
-
212
-
-
0010952932
-
Copyrights and author responsibilities
-
H. S. Stone, “Copyrights and author responsibilities,” Computer, December 1992, pp. 46-51.
-
(1992)
Computer
, pp. 46-51
-
-
Stone, H.S.1
-
213
-
-
85037109283
-
Microsoft found guilty
-
February 24
-
“Microsoft found guilty,” The Tampa Tribune, February 24, 1994.
-
(1994)
The Tampa Tribune
-
-
-
214
-
-
0026954536
-
International software piracy
-
S. P. Weisband and S. E. Goodman, “International software piracy,” Computer, November 1992, pp. 87-90.
-
(1992)
Computer
, pp. 87-90
-
-
Weisband, S.P.1
Goodman, S.E.2
-
215
-
-
0041999972
-
Decompilation and Dim sembly: Undoing Software Protection
-
A.R. Grogan, "Decompilation and Dim sembly: Undoing Software Protection,” Computer Laxuyer, Feb. 1984, pp. 1-11.
-
(1984)
Computer Laxuyer
, pp. 1-11
-
-
Grogan, A.R.1
-
216
-
-
85037146424
-
Common Law, Uncommon Software
-
Summer
-
D. Davidson, "Common Law, Uncommon Software,” Imu of Pittsburgh Law Reuiew, Summer 1986, pp. 1,037-1,117.
-
(1986)
Imu of Pittsburgh Law Reuiew
, pp. 037-41
-
-
Davidson, D.1
-
217
-
-
0041999874
-
Protection of Trade Secrets In Object-Form Software: The Case for Reverse Engineering
-
ILS. Laurie and S.M. Everett, "Protection of Trade Secrets In Object-Form Software: The Case for Reverse Engineering,” Com puter Lawyer, july 1984, pp. 1-11.
-
(1984)
Com Puter Lawyer
, pp. 1-11
-
-
Laurie, I.L.S.1
Everett, S.M.2
-
218
-
-
85037154610
-
Reverse Engineering and Intellectual-Property Law
-
March
-
Committee on Computer Law, “Reverse Engineering and Intellectual-Property Law," Rscord Assn. the Bar of the City of New York March 1989, pp. 132-158.
-
(1989)
Rscord Assn the bar of the City of New York
, pp. 132-158
-
-
-
219
-
-
0021892424
-
On Revene Engineering
-
M.G. Rekoff, “On Revene Engineering,” IEEE Thms. Systems, Man, and Qybenwdes, March-April 1985, pp. 244-252.
-
(1985)
IEEE Thms. Systems, Man, and Qybenwdes
, pp. 244-252
-
-
Rekoff, M.G.1
-
220
-
-
85037068697
-
"Last Frontier Conference Report on Copyright Protection of Computer Soft-vac
-
Winter
-
Center for Law, Science, and Technology, "Last Frontier Conference Report on Copyright Protection of Computer Soft-vac,” Jurimetrial. Winter 1989.
-
(1989)
Jurimetria
-
-
-
221
-
-
0021492315
-
Contu Revisited: The Case against Copyright Protection for Computer Programs in Machine-Readable Form
-
P. Samuelson, "Contu Revisited: The Case against Copyright Protection for Computer Programs in Machine-Readable Form,” Duke LawJ., Oct 1984, pp. 663-752.
-
(1984)
Duke Lawj
, pp. 663-752
-
-
Samuelson, P.1
-
222
-
-
0041999847
-
Modifying Copyrighted Software: Adjusting Copyright Doctrine to Accommodate a Tcdmöks
-
Winter
-
P. Samuelson, "Modifying Copyrighted Software: Adjusting Copyright Doctrine to Accommodate a Tcdmöks,” ßmmdna Winter 1988, pp. 179-221.
-
(1988)
ßmmdna
, pp. 179-221
-
-
Samuelson, P.1
-
223
-
-
84976852014
-
President’s Letter. Reverse Engineering
-
April
-
R. Kocher, "President’s Letter. Reverse Engineering,” Gmml ACM, April 1989, p. 419.
-
(1989)
Gmml ACM
, pp. 419
-
-
Kocher, R.1
-
224
-
-
85037122846
-
-
Cambre 11 Hall, Emory University, Atlanta, GA 30322
-
Address questions to Samuelson at Law School, Cambre 11 Hall, Emory University, Atlanta, GA 30322.
-
-
-
-
225
-
-
0011379188
-
Nurturing electrophobia
-
E. Adair, “Nurturing electrophobia,” IEEE Spectrum, August 1990, pp. 11-14.
-
(1990)
IEEE Spectrum
, pp. 11-14
-
-
Adair, E.1
-
226
-
-
0028736330
-
Electric and magnetic fields: The perceived public risks
-
J. R. Ashley, “Electric and magnetic fields: The perceived public risks,” IEEE SouthCon’94, pp. 463-467.
-
IEEE SouthCon’94
, pp. 463-467
-
-
Ashley, J.R.1
-
227
-
-
85037134900
-
New laser used to treat carpal tunnel syndrome
-
January 23
-
J. Baird, “New laser used to treat carpal tunnel syndrome,” The Tampa Tribune-Times, January 23, 1994.
-
(1994)
The Tampa Tribune-Times
-
-
Baird, J.1
-
228
-
-
0027668425
-
Green Products for Green Profits
-
D. Bendz, “Green Products for Green Profits,” IEEE Spectrum, September 1993, pp. 63-66.
-
(1993)
IEEE Spectrum
, pp. 63-66
-
-
Bendz, D.1
-
229
-
-
85037108263
-
Making your office human-friendly
-
A. Dunkin, “Making your office human-friendly,” Business Week, August 20, 1990, pp. 100-101.
-
(1990)
Business Week
, pp. 100-101
-
-
Dunkin, A.1
-
230
-
-
0001798359
-
Electromagnetic fields: The jurys still out,”
-
K. Fitzgerald, I. Nair, and G. Morgan, “Electromagnetic fields: The jury’s still out,” IEEE Spectrum, August 1990, pp. 22-35.
-
(1990)
IEEE Spectrum
, pp. 22-35
-
-
Fitzgerald, K.1
Nair, I.2
Morgan, G.3
-
231
-
-
0028407992
-
Electric & magnetic fields
-
K. B. Maracas, “Electric & magnetic fields,” IEEE Potentials, April 1994, pp. 22-25.
-
(1994)
IEEE Potentials
, pp. 22-25
-
-
Maracas, K.B.1
-
232
-
-
0003928923
-
-
Second Edition), Signet Books
-
D. H. Meadows, D. L. Meadows, J. Randers, and W. W. Behrens, The Limits to Growth (Second Edition), Signet Books, 1975.
-
(1975)
The Limits to Growth
-
-
Meadows, D.H.1
Meadows, D.L.2
Randers, J.3
Behrens, W.W.4
-
233
-
-
85037085364
-
IBM cleared by jury in stress injury case
-
“IBM cleared by jury in stress injury case,” New York Times report, The Tampa Tribune, March 9,1995.
-
(1995)
New York Times Report, the Tampa Tribune
-
-
-
234
-
-
0002214055
-
Todays view of magnetic fields,”
-
T. S. Perry, “Today’s view of magnetic fields,” IEEE Spectrum, December 1994, pp. 14-23.
-
(1994)
IEEE Spectrum
, pp. 14-23
-
-
Perry, T.S.1
-
236
-
-
0003160187
-
Fields of fear
-
G. Taubes, “Fields of fear,” The Atlantic Monthly, November 1994, pp. 94-108.
-
(1994)
The Atlantic Monthly
, pp. 94-108
-
-
Taubes, G.1
-
238
-
-
0026851366
-
Video Display Terminal Fringing Magnetic Field Measurements
-
D. Sapashe and J.R. Ashley, “Video Display Terminal Fringing Magnetic Field Measurements,” IEEE Trans. Instrumentation and Measurement, Vol. 41, No. 3, Apr. 1992, pp. 178-184.
-
(1992)
IEEE Trans. Instrumentation and Measurement
, vol.41
, Issue.3
, pp. 178-184
-
-
Sapashe, D.1
Ashley, J.R.2
-
239
-
-
77950451403
-
The Magnetic Field Menace
-
P. Brodeur, “The Magnetic Field Menace,” MacWorld, July 1990, pp. 136-145.
-
(1990)
Macworld
, pp. 136-145
-
-
Brodeur, P.1
-
240
-
-
0003458988
-
-
ANSI/IEEE C95.1 -1991, IEEE, New York, Apr. 27
-
IEEE Standard Safety Levels with Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz, ANSI/IEEE C95.1 -1991, IEEE, New York, Apr. 27,1992.
-
(1992)
IEEE Standard Safety Levels with Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 Khz to 300 Ghz
-
-
-
241
-
-
2742542063
-
-
ANSI/IEEE C2-1990, IEEE, New York, Aug. 1
-
Nat'I Electrical Safety Code, ANSI/IEEE C2-1990, IEEE, New York, Aug. 1,1989.
-
(1989)
Nat'i Electrical Safety Code
-
-
-
244
-
-
85037105323
-
Catcalls offend, but should they be a crime?
-
J. Beck, “Catcalls offend, but should they be a crime?” The Tampa Tribune, March 13, 1993.
-
(1993)
The Tampa Tribune
-
-
Beck, J.1
-
245
-
-
85037113161
-
More men claiming sex harassment
-
S. Cohen, “More men claiming sex harassment,” The Tampa Tribune, January 24, 1994.
-
(1994)
The Tampa Tribune
-
-
Cohen, S.1
-
246
-
-
85037086676
-
Special issue on women in computing
-
“Special issue on women in computing,” Communications of the ACM, January 1995.
-
(1995)
Communications of the ACM
-
-
-
247
-
-
85037158684
-
Former sheriff starts chapter for whites only
-
G. Coryell, “Former sheriff starts chapter for whites only,” The Tampa Tribune, August 31, 1994.
-
(1994)
The Tampa Tribune
-
-
Coryell, G.1
-
249
-
-
0002097863
-
Degrees and diversity at work
-
N. DiTomaso, G. F. Farris, and R. Cordero, “Degrees and diversity at work,” IEEE Spectrum, April 1994, pp. 38-42.
-
(1994)
IEEE Spectrum
, pp. 38-42
-
-
Ditomaso, N.1
Farris, G.F.2
Cordero, R.3
-
250
-
-
0042928070
-
Diversity in the High-Tech Workplace
-
N. DiTomaso and G. F. Farris, “Diversity in the High-Tech Workplace,” IEEE Spectrum, June 1992, pp. 20-32.
-
(1992)
IEEE Spectrum
, pp. 20-32
-
-
Ditomaso, N.1
Farris, G.F.2
-
251
-
-
0002618591
-
Sexual harassment: What to do
-
A. N. Fisher, “Sexual harassment: What to do,” Fortune, August 23, 1993, pp. 84-88.
-
(1993)
Fortune
, pp. 84-88
-
-
Fisher, A.N.1
-
253
-
-
8744266208
-
Educating more minority engineers
-
E. W. Gordon, “Educating more minority engineers,” Technology Review, July 1988, pp. 69-73.
-
(1988)
Technology Review
, pp. 69-73
-
-
Gordon, E.W.1
-
254
-
-
0026955219
-
The 1990-91 Taulbee Survey Report
-
D. Gries and D. Marsh, “The 1990-91 Taulbee Survey Report,” Computer, November 1992, pp. 69-75.
-
(1992)
Computer
, pp. 69-75
-
-
Gries, D.1
Marsh, D.2
-
255
-
-
85037123504
-
Reinvigorating the fight against discrimination
-
A. Grimes, “Reinvigorating the fight against discrimination,” The Washington Post, October 27, 1994.
-
(1994)
The Washington Post
-
-
Grimes, A.1
-
256
-
-
85037065712
-
Court expands sex harassment definition,”
-
G. Klein, “Court expands sex harassment definition,” The Tampa Tribune, November 10, 1993.
-
(1993)
The Tampa Tribune
-
-
Klein, G.1
-
257
-
-
85037158050
-
Scholarships based on race have value, study says
-
L. L. Knutson, “Scholarships based on race have value, study says,” The Seattle Post-Intelligencer, January 15, 1994.
-
(1994)
The Seattle Post-Intelligencer
-
-
Knutson, L.L.1
-
258
-
-
85037167135
-
Grants by race illustrate demise of colorblindness
-
Charles Krauthammer, “Grants by race illustrate demise of colorblindness,” The Tampa Tribune, September 27, 1992.
-
(1992)
The Tampa Tribune
-
-
Krauthammer, C.1
-
259
-
-
85037172116
-
Denny's settles bias case
-
J. Lawlor, “Denny's settles bias case,” USA Today, May 25, 1994.
-
(1994)
USA Today
-
-
Lawlor, J.1
-
260
-
-
85037114828
-
Women treated differently in CS department
-
N. G. Leveson, “Women treated differently in CS department,” Computing Research News, January 1991, p. 13.
-
(1991)
Computing Research News
, pp. 13
-
-
Leveson, N.G.1
-
261
-
-
85037168510
-
New pigeonholes would create more barriers to unity,”
-
D. Murdock, “New pigeonholes would create more barriers to unity,” The Tampa Tribune, July 7, 1994.
-
(1994)
The Tampa Tribune
-
-
Murdock, D.1
-
262
-
-
85037169956
-
Final rules give clearer picture of unpaid family, medical leave
-
New York Times Report,” Final rules give clearer picture of unpaid family, medical leave,” The Tampa Tribune, February 6, 1995.
-
(1995)
The Tampa Tribune
-
-
-
263
-
-
0025514236
-
Becoming a computer scientist
-
A. Pearl, M. E. Pollack, E. Riskin, B. Thomas, E. Wolf, and A. Wu, “Becoming a computer scientist,” Communications of the ACM, November 1990, pp. 47-57.
-
(1990)
Communications of the ACM
, pp. 47-57
-
-
Pearl, A.1
Pollack, M.E.2
Riskin, E.3
Thomas, B.4
Wolf, E.5
Wu, A.6
-
264
-
-
85037090947
-
Diversity: When enough is enough
-
W. Raspberry, “Diversity: When enough is enough,” The Tampa Tribune, February 11, 1994.
-
(1994)
The Tampa Tribune
-
-
Raspberry, W.1
-
266
-
-
85037065810
-
Three women file same-sex harassment complaint
-
D. Solov, “Three women file same-sex harassment complaint,” The Tampa Tribune, February 24, 1994.
-
(1994)
The Tampa Tribune
-
-
Solov, D.1
-
267
-
-
85037129892
-
Professor wins race bias suit
-
D. Sommer, “Professor wins race bias suit,” The Tampa Tribune, June 3, 1993.
-
(1993)
The Tampa Tribune
-
-
Sommer, D.1
-
268
-
-
85037139758
-
Girls get only a third of National Merit Scholarships
-
“Girls get only a third of National Merit Scholarships,” The St. Petersburg Times, May 26, 1993.
-
(1993)
The St. Petersburg Times
-
-
-
269
-
-
85037132800
-
Americas scapegoats,” Newsweek, October 31, 1994. “Secretary accepts reduced award,”
-
C. L. Tien, “America’s scapegoats,” Newsweek, October 31, 1994. “Secretary accepts reduced award,” The Tampa Tribune, December 13, 1994.
-
(1994)
The Tampa Tribune
-
-
Tien, C.L.1
-
270
-
-
85037174373
-
School presses delete key on computer porn photos
-
“School presses delete key on computer porn photos,” The Tampa Tribune, November 22, 1994.
-
(1994)
The Tampa Tribune
-
-
-
271
-
-
85037104410
-
Harrassment case nets woman cash
-
“Harrassment case nets woman cash,” The Tampa Tribune, September 2, 1994.
-
(1994)
The Tampa Tribune
-
-
-
272
-
-
85037172313
-
Women now top men in college goals
-
“Women now top men in college goals,” The Tampa Tribune, January 24, 1994.
-
(1994)
The Tampa Tribune
-
-
-
273
-
-
85037085963
-
Controversial video game removed by retailer
-
“Controversial video game removed by retailer,” The Tampa Tribune, December 17, 1993.
-
(1993)
The Tampa Tribune
-
-
-
274
-
-
85037107254
-
Masses huddle to block immigrants
-
“Masses huddle to block immigrants,” The Tampa Tribune, July 25, 1993.
-
(1993)
The Tampa Tribune
-
-
-
275
-
-
85037149044
-
Porn pirates and software smugglers
-
“Porn pirates and software smugglers,” Time, July 25, 1994.
-
(1994)
Time
-
-
-
276
-
-
85037103359
-
Family policies earn praise from companies
-
R. Trigaux, “Family policies earn praise from companies,” The St. Petersburg Times, September 13, 1994.
-
(1994)
The St. Petersburg Times
-
-
Trigaux, R.1
-
277
-
-
85037081522
-
Womens colleges filling classrooms,”
-
R. Vigoda, “Women’s colleges filling classrooms,” The Tampa Trib-une-Times, September 11, 1994.
-
(1994)
The Tampa Trib-Une-Times
-
-
Vigoda, R.1
-
278
-
-
85037064500
-
A step toward colorblind public policy
-
G. F. Will, “A step toward colorblind public policy,” The Tampa Tribune, November 3, 1994.
-
(1994)
The Tampa Tribune
-
-
Will, G.F.1
-
281
-
-
84944983514
-
Dos and donts for young EEs,”
-
C. A. Fowler, “Dos and don’ts for young EEs,” IEEE Spectrum, October 1993, pp. 59-61.
-
(1993)
IEEE Spectrum
, pp. 59-61
-
-
Fowler, C.A.1
-
282
-
-
85037101686
-
Risking your way to the top
-
J. Matson, “Risking your way to the top,” Graduating Engineer, March 1994, pp. 34-36.
-
(1994)
Graduating Engineer
, pp. 34-36
-
-
Matson, J.1
-
283
-
-
85037074320
-
Drug testing of employees is on the rise
-
M. Odum, “Drug testing of employees is on the rise,” The Tampa Tribune, November 3,1993.
-
(1993)
The Tampa Tribune
-
-
Odum, M.1
-
284
-
-
0027575897
-
How engineers see themselves
-
H. Woolf, “How engineers see themselves,” IEEE Spectrum, April 1993, pp. 24-28.
-
(1993)
IEEE Spectrum
, pp. 24-28
-
-
Woolf, H.1
-
285
-
-
85037106508
-
Every street is paved with gold
-
K. Woo-Choong, “Every street is paved with gold,” Success, October 1992, pp. 62-64.
-
(1992)
Success
, pp. 62-64
-
-
Woo-Choong, K.1
|