Under construction.

The “Access reading” link will typically lead to the library catalog record for a resource. This ensures that you will be prompted to log in if you are off-campus. You will need to click on the link within the library record to reach the reading itself. Refer to page numbers in the Schedule to determine what parts are assigned.

Background readings (usually for lab days)

CS 105 Spring 2019 Bibliography

Abbate, Janet. “Code Switch: Alternative Visions of Computer Expertise as Empowerment from the 1960s to the 2010s.” Technology and Culture, vol. 59 no. 4, 2018, pp. S134-S159. Access reading.

Angwin, Julia, et al. “Machine Bias.” ProPublica, Pro Publica Inc., 23 May 2016, Access reading.

Association of Computing Machinery Code of Ethics & Pofessional Conduct. 2018. Access reading

Barger, Robert N. Computer Ethics: A Case-Based Approach. Cambridge University Press, 2008. Access reading. Access reading.

Barry, Ellen. “Protests in Moldova Explode, With Help of Twitter.” New York Times, April 7th, 2009. Access reading.

Bonde, Firenze, et al. “A Framework for Making Ethical Decisions.” Brown University Science & Technology Studies. Access reading.

Bush, Vannevar. “As We May Think.” The Atlantic July 1945. Reprinted in ACM Interactions 3.2, March 1996, pp. 35-46. Access reading

Code of Ethics of the American Library Association. 2008. Access reading

Coover, Robert. “A History of the Future of Narrative.” The Cambridge History of the American Novel, edited by Leonard Cassuto, Cambridge University Press, Cambridge, 2011, pp. 1168–1181. Access reading on PWeb.

Flatow, Ira, host. “Improving Healthcare, One Search At A Time.” Talk of the Nation, NPR, 15 Mar. 2013. NPR,

Grier, David Alan. When Computers Were Human. Princeton University Press, 2005. Access reading

Haas, Angela M. “Wampum as Hypertext: An American Indian Intellectual Tradition of Multimedia Theory and Practice.” Studies in American Indian Literatures, vol. 19, no. 4, University of Nebraska Press, Dec. 2007, pp. 77–100, doi:10.1353/ail.2008.0005. Access reading

Isaak, Hannah et al. User Data Privacy on Facebook (full citation needed) Access reading

Johnson, Aaron M., and Sidney Axinn. “THE MORALITY OF AUTONOMOUS ROBOTS.” Journal of Military Ethics, vol. 12, no. 2, 2013, pp. 129-141. ProQuest,, doi: Access reading.

Kilby, Jack S. Nobel Lecture. Nobel Media AB 2019. Tue. 15 Jan 2019. Access reading

Luerweg, Frank. “The Internet Knows You Better Than Your Spouse Does.” Scientific American. March 4, 2019. Access reading.

Light, Jennifer S. “When Computers Were Women.” Technology and Culture, vol. 40, no. 3, 1999, pp. 455–483. Access reading

Mahoney, Michael S. “The Histories of Computing(s).” Interdisciplinary Science Reviews, vol. 30, no. 2, Taylor & Francis, June 2005, pp. 119–35, doi:10.1179/030801805X25927. Access reading

Maras, Marie-Helen, and Alex Alexandrou. “Determining Authenticity of Video Evidence in the Age of Artificial Intelligence and in the wake of Deepfake videos.” The International Journal of Evidence & Proof. Oct 28, 2018. Access reading.

Mungiu-Pippidi, A., & Munteanu, I. (2009). Moldova’s “twitter revolution”. Journal of Democracy, 20(3), 136-142. Retrieved from Access reading.

Nakamura, Lisa. “Indigenous Circuits: Navajo Women and the Racialization of Early Electronic Manufacture.” American Quarterly, vol. 66, no. 4, 2014, pp. 919–41, doi:10.1353/aq.2014.0070. Access reading

Obama, Barack: “Weekly Address: Giving Every Student an Opportunity to Learn Through Computer Science For All.” January 30, 2014. Access reading.

O’Regan, Gerard. Introduction to the History of Computing : a Computing History Primer . Springer, 2016, doi:10.1007/978-3-319-33138-6. Access reading

Richtel, Matt. “Reading, Writing, Arithmetic, and Increasingly, Coding.” New York Times, May 10, 2014.  Access reading

Rini, Regina. “Fake News and Partisan Epistemology.” Kennedy Institute of Ethics Journal, vol. 27 no. 2, 2017, pp. E-43-E-64. Project MUSE, doi:10.1353/ken.2017.0025. Access reading.

Ritchie, Dennis. “The Evolution of the Unix Time-sharing System.” Reprint based on AT&T Bell Laboratories Technical Journal vol. 63, no. 6, part 2, October 1984, pp. 1577-93. Access reading.

Saunders, Kurt M., and Bruce Zucker. “Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act.” International Review of Law, Computers & Technology, vol. 13, no. 2, 1999, pp. 183–192., doi:10.1080/13600869955134. Access reading.

Singer, Natasha. “Amazon’s Facial Recognition Wrongly Identifies 28 Lawmakers, A.C.L.U Says.” The New York Times, 26 July 2018, Access reading.

Thompson, Caleb. “Don’t Get Distracted.” Talk archived on author website. 16 November 2017. Access reading.

Thompson, Clive. “The Secret History of Women in Coding.” The New York Times, The New York Times, 13 Feb. 2019. Access reading.

Unsworth, John. “Living Inside the (Operating) System: Community in Virtual Reality (Draft).” Access reading.

Von Neumann, John. “First Draft of a Report on the EDVAC.” 1945. Reprint introduction by Michael Godfrey. IEEE Annals of the History of Computing 15.4, October 1993, pp. 27-75. Access reading

If you’re interested, this is the original, archived at the Smithsonian: