Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Annual Editions: Computers in Society 10/11 - Paul De Palma

Annual Editions: Computers in Society 10/11

(Autor)

Buch | Softcover
208 Seiten
2010 | 16th edition
McGraw-Hill Professional (Verlag)
978-0-07-352858-8 (ISBN)
CHF 49,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Designed to provide access to a range of articles from some of the magazines, newspapers, and journals published. This series includes a number of common organizational features designed to make them useful in the classroom. It offers an online Instructor's Resource Guide with testing materials.
Annual Editions is a series of over 65 volumes, each designed to provide convenient, inexpensive access to a wide range of current articles from some of the most respected magazines, newspapers, and journals published today. Annual Editions are updated on a regular basis through a continuous monitoring of over 300 periodical sources. The articles selected are authored by prominent scholars, researchers, and commentators writing for a general audience. The Annual Editions volumes have a number of common organizational features designed to make them particularly useful in the classroom: a general introduction; an annotated table of contents; a topic guide; an annotated listing of selected World Wide Web sites; and a brief overview for each section. Each volume also offers an online Instructor's Resource Guide with testing materials. Using Annual Editions in the Classroom is offered as a practical guide for instructors and is available in print or online. Visit www.mhcls.com for more details.

Annual Editions: Computers in Society 10/11

Preface

Correlation Guide

Topic Guide

Internet References

UNIT 1: IntroductionUnit Overview1. Five Things We Need to Know about Technological Change, Neil Postman, New Tech ’98 Conference, March 27, 1998Postman suggests that computer technology is too important to be left entirely to the technologists. “Embedded in every technology,” he says, “is a powerful idea. . . .”2. Moore’s Law and Technological Determinism: Reflections on the History of Technology, Paul E. Ceruzzi, Technology and Culture, July 2005“The steady and unstoppable march of semiconductor density” leads this writer to make the unfashionable claim that “in at least one instance, raw technological determinism is at work.”UNIT 2: The EconomyUnit Overview3. Click Fraud: The Dark Side of Online Advertising, Brian Grow and Ben Elgin, BusinessWeek, October 2, 2006Internet advertisers think they pay only when an interested customer clicks on their ads. Martin Fleischman, an Atlanta businessman, “noticed a growing number of puzzling clicks coming from such places as Botswana, Mongolia, and Syria.”4. Online Salvation?, Paul Farhi, American Journalism Review, December 2007/January 2008In 2003, newspapers earned $1.2 billion through online services. By 2006, the figure had grown to $2.7 billion. Will the Internet save the beleaguered newspaper business?5. Great Wall of Facebook: The Social Network’s Plan to Dominate the Internet—and Keep Google Out, Fred Vogelstein, Wired, July 2009Facebook, a company that has yet to turn a profit, is challenging Google, the most powerful company on the Web.6. Beyond Blogs, Stephen Baker and Heather Green, BusinessWeek, June 2, 2008When authors call their 2005 article an “outdated relic,” we know we’re in the land of computing. Here they tell us about developments since the first blogs.7. Personally Controlled Online Health Data—The Next Big Thing in Medical Care?, Robert Steinbrook, MD, The New England Journal of Medicine, April 17, 2008At $2.1 trillion dollars, health care is a large piece of the US economy. Electronic health care data that is “personally controlled” could “help . . . reduce the cost of care.”UNIT 3: Work and the WorkplaceUnit Overview8. National ID: Biometrics Pinned to Social Security Cards, Ryan Singel, Wired, May 15, 2007Though calls for immigration reform have been temporarily sidelined by the economic crisis, they are bound to return. One proposal is to issue American workers tamper-proof biometric Social Security cards. These “would replace the text-only design that’s been issued to Americans almost without change for more than 70 years.”9. Dilberts of the World, Unite!, David Sirota, The Nation, June 23, 2008Faced with industry giants who outsource work to India on one hand and import lower cost engineers on the other, software developers have begun to organize.10. Computer Software Engineers, Occupational Outlook Handbook, 2006/07 Edition“Computer software engineers are one of the occupations projected to grow the fastest and add the most new jobs over the 2006-16 decade,” this despite years of worry that high-tech jobs are being shipped abroad.11. How Deep Can You Probe?, Rita Zeidner, HR Magazine, October 2007Tales of employers searching Facebook pages notwithstanding, “many states limit the extent to which employers can consider off duty conduct in making a hiring decision. . . .”12. Privacy, Legislation, and Surveillance Software, G. Daryl Nord, Tipton F. McCubbins, and Jeretta Horn Nord, Communications of the ACM, August 2006The assumption of employee privacy in the workplace “may be naïve.” Constitutional protections against unreasonable search and seizure “usually apply only to state actions.”UNIT 4: Computers, People, and Social ParticipationUnit Overview13. Is Google Making Us Stupid?, Nicholas Carr, The Atlantic, July 2008Here is one commentator who worries that multitasking is destroying his ability to concentrate. 14. The End of Solitude, William Deresiewicz, The Chronicle Review, The Chronicle of Higher Education, January 30, 2009What does it mean for the author’s sense of closeness “when my Facebook News Feed tells me that Sally Smith (whom I haven’t seen since high school, and wasn’t all that friendly with even then) `is making coffee and staring off into space.’ ”15. Girl Power, Chuck Salter, Fast Company, September 2007How does a seventeen-year-old run a million-dollar website?16. Bloggers against Torture, Negar Azimi, The Nation, February 19, 2007Authoritarian regimes can’t always operate in secret, now that bloggers are writing.17. It’s Not Easy to Stand up to Cyberbullies, but We Must, Robert M. O’Neil, The Chronicle of Higher Education, July 11, 2008There is very little, says the author, “that concerned institutions (or their besmirched students) can do to clean up their electronic neighborhoods.”18. The Nike Experiment: How the Shoe Giant Unleashed the Power of Personal Metrics, Mark McClusky, Wired, July 2009What does a ninety-year-old study done at a Western Electric plant have to do with remote sensors, hi-tech sneakers, and social networking sites? Says McClusky, people seem to “change their behavior—often for the better—when they are being observed.”19. Center Stage, Carl Sessions Stepp, American Journalism Review, April/May 2006How does a newspaper’s web version differ from the print version? The web version receives little editing.20. E-Mail Is for Old People, Dan Carnevale, The Chronicle of Higher Education, October 6, 2006Reaching students through e-mail has become more difficult as students turn to text messaging and social networking. UNIT 5: Societal Institutions: Law, Politics, Education, and the MilitaryUnit Overview21. The Coming Robot Army, Steve Featherstone, Harper’s Magazine, February 2007“Within our lifetime,” says Featherstone, “robots will give the ability to wage war without committing ourselves to the human cost of actually fighting a war.”22. Google & the Future of Books, Robert Darnton, The New York Review of Books, February 12, 2009“Four years ago, Google began digitizing books from research libraries,” says the director of the Harvard library. No one knows what the consequences will be.23. Archiving Writers’ Work in the Age of E-Mail, Steve Kolowich, The Chronicle of Higher Education, April 10, 2009The late John Updike’s “papers” arrived at Harvard’s Houghton Library on floppy disk. The promise and peril of the information age calls for people with the “resourcefulness to retrofit modernity’s round holes to accommodate antiquity’s square pegs.”24. Wikipedia in the Newsroom, Donna Shaw, American Journalism Review, February/March 2008Whether professionals can cite a source that is collective and anonymous remains problematic.25. E-Mail in Academia: Expectations, Use, and Instructional Impact, Meredith Weiss and Dana Hanson-Baldauf, Educause Quarterly, Number 1 2008Studies have shown that there is a relationship between a student’s success and “the quality of one-on-one communication between teacher and student.” What happens when you add e-mail to the mix?UNIT 6: Risk and Avoiding RiskUnit Overview26. A Growing Watch List, Karen DeYoung, The Washington Post National Weekly Edition, April 2–8, 2007The Terrorist Identities Datamart Environment database contains information on over 450,000 persons, many of them U.S. citizens. What happens if there is an error?27. The Evolution of Cyber Warfare, Greg Bruno, Backgrounder: Council on Foreign Relations, February 27, 2008The Department of Homeland Security recorded over 100,000 attacks
on military, government, and private computer systems in 2007.28. Geeks and Hackers, Uncle Sam’s Cyber Force Wants You!, William J. Astore, The Nation, June 5, 2008“Do we really want the military to dominate cyberspace?” asks this retired Air Force Lieutenant Colonel.29. Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook, Simson Garfinkel, Technology Review, July/August 2009“Here’s a koan for the information age: Why do so many privacy activists have Facebook pages?” asks Garfinkel. The answer is obvious. Social networks are “where the action is.”30. The Software Wars: Why You Can’t Understand Your Computer, Paul De Palma, American Scholar, Winter 2005Excessive complexity and cost overruns make software development like military procurement. 31. False Reporting on the Internet and the Spread of Rumors: Three Case Studies, Paul Hitlin, gnovis, April 26, 2004Internet news sources can sometimes be unreliable. Paul Hitlin examines Internet coverage of the Vince Foster suicide, along with other stories to understand why this is so.UNIT 7: International Perspectives and IssuesUnit Overview32. China’s Tech Generation Finds a New Chairman to Venerate, Kevin Holden, Wired, May 24, 2007The new China is not a place that would have made Chairman Mao comfortable. One indication is the popularity of Bill Gates. 33. New Tech, Old Habits, Moon Ihlwan and Kenji Hall, BusinessWeek, March 26, 2007Japan and South Korea are behind the U.S. when it comes to the productivity of information technology workers. The answer may be as simple as telecommuting. 34. Iran’s Twitter Revolution? Maybe Not Yet, Joel Schectman, BusinessWeek, June 17, 2009Media around the world elevated twittering to a revolutionary act this past spring and early summer. Closer examination shows that things are more complex.35. The List: Look Who’s Censoring the Internet Now, Joshua Keating, Foreign Policy, March 2009We are used to hearing about Internet censors in China and Iran. But Australia and France?36. Dissent Made Safer: How Anonymity Technology Could Save Free Speech on the Internet, David Talbot, Technology Review, August 15, 2009Tariq Biasi of Syria is spending three years in prison for “dwindling the national feeling.” Systems like Tor, “an open-source anonymity system,” can help dissidents in Zimbabwe and ordinary web surfers anywhere evade censorship. UNIT 8: The Frontier of ComputingUnit Overview37. A Nascent Robotics Culture: New Complicities for Companionship, Sherry Turkle, AAAI Technical Report, July 2006“What is a robot kind of love?” and “What will we be like, what kind of people are we becoming as we develop increasingly intimate relationships with machines?” MIT’s pioneering sociologist tries to answer both questions.38. Toward Nature-Inspired Computing, Jiming Liu and K. C. Tsui, Communications of the ACM, October 2006Computer scientists are turning to biology as a source of inspiration for models of complex systems. These biological models change the rules for governing systems behavior.39. Google and the Wisdom of Clouds, Stephen Baker, BusinessWeek, December 24, 2007Google is teaching researchers around the world how to extract patterns using clusters of computers that it calls “the cloud.” 40. Cloud Computing, Brian Hayes, Communications of the ACM, July 2008“. . . the sudden stylishness of the cloud paradigm” is an odd return to a mode of computing developed fifty years ago. The more things change . . .41. The Coming Superbrain, John Markoff, The New York Times, May 24, 2009Artificial Intelligence, often criticized for making failed promises, is back with a vengeance. Watch out for the singularity, opening at a theatre near you.Test-Your-Knowledge Form

Article Rating Form

Erscheint lt. Verlag 16.3.2010
Sprache englisch
Maße 211 x 272 mm
Gewicht 388 g
Themenwelt Informatik Office Programme Outlook
Sozialwissenschaften Soziologie
ISBN-10 0-07-352858-7 / 0073528587
ISBN-13 978-0-07-352858-8 / 9780073528588
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich