Download the Free Fishpond App!
Download on the App Store

Android App on Google play
Annual Editions: Computers in Society 10/11 (Annual Editions: Computers in Society)

Already own it?

Sell Yours
Home » Books » Nonfiction » Social Sciences » Sociology » General

Annual Editions

Computers in Society 10/11 (Annual Editions: Computers in Society)

By De, Palma, Paul de Palma

$52.12
Free shipping Australia wide
Condition: New
Ships within: 4-8 days
New or Used: 79 copies from $52.12
Order now for Christmas delivery
Rating:
 
Register or sign-in to rate and get recommendations.
Format: Paperback / softback, 208 pages, 16th Edition
Published In: United States, 08 June 2010
"Annual Editions" is a series of over 65 volumes, each designed to provide convenient, inexpensive access to a wide range of current articles from some of the most respected magazines, newspapers, and journals published today. "Annual Editions" are updated on a regular basis through a continuous monitoring of over 300 periodical sources. The articles selected are authored by prominent scholars, researchers, and commentators writing for a general audience. The "Annual Editions" volumes have a number of common organizational features designed to make them particularly useful in the classroom: a general introduction; an annotated table of contents; a topic guide; an annotated listing of selected World Wide Web sites; and a brief overview for each section. Each volume also offers an online Instructor's Resource Guide with testing materials. Using "Annual Editions" in the Classroom is offered as a practical guide for instructors and is available in print or online.

Table of Contents

Annual Editions: Computers in Society 10/11 Preface Correlation Guide Topic Guide Internet References UNIT 1: Introduction Unit Overview 1. Five Things We Need to Know about Technological Change, Neil Postman, New Tech '98 Conference, March 27, 1998 Postman suggests that computer technology is too important to be left entirely to the technologists. "Embedded in every technology," he says, "is a powerful idea..." 2. Moore's Law and Technological Determinism: Reflections on the History of Technology, Paul E. Ceruzzi, Technology and Culture, July 2005 "The steady and unstoppable march of semiconductor density" leads this writer to make the unfashionable claim that "in at least one instance, raw technological determinism is at work." UNIT 2: The Economy Unit Overview 3. Click Fraud: The Dark Side of Online Advertising, Brian Grow and Ben Elgin, BusinessWeek, October 2, 2006 Internet advertisers think they pay only when an interested customer clicks on their ads. Martin Fleischman, an Atlanta businessman, "noticed a growing number of puzzling clicks coming from such places as Botswana, Mongolia, and Syria." 4. Online Salvation?, Paul Farhi, American Journalism Review, December 2007/January 2008 In 2003, newspapers earned $1.2 billion through online services. By 2006, the figure had grown to $2.7 billion. Will the Internet save the beleaguered newspaper business? 5. Great Wall of Facebook: The Social Network's Plan to Dominate the Internet-and Keep Google Out, Fred Vogelstein, Wired, July 2009 Facebook, a company that has yet to turn a profit, is challenging Google, the most powerful company on the Web. 6. Beyond Blogs, Stephen Baker and Heather Green, BusinessWeek, June 2, 2008 When authors call their 2005 article an "outdated relic," we know we're in the land of computing. Here they tell us about developments since the first blogs. 7. Personally Controlled Online Health Data-The Next Big Thing in Medical Care?, Robert Steinbrook, MD, The New England Journal of Medicine, April 17, 2008 At $2.1 trillion dollars, health care is a large piece of the US economy. Electronic health care data that is "personally controlled" could "help ... reduce the cost of care." UNIT 3: Work and the Workplace Unit Overview 8. National ID: Biometrics Pinned to Social Security Cards, Ryan Singel, Wired, May 15, 2007 Though calls for immigration reform have been temporarily sidelined by the economic crisis, they are bound to return. One proposal is to issue American workers tamper-proof biometric Social Security cards. These "would replace the text-only design that's been issued to Americans almost without change for more than 70 years." 9. Dilberts of the World, Unite!, David Sirota, The Nation, June 23, 2008 Faced with industry giants who outsource work to India on one hand and import lower cost engineers on the other, software developers have begun to organize. 10. Computer Software Engineers, Occupational Outlook Handbook, 2006/07 Edition "Computer software engineers are one of the occupations projected to grow the fastest and add the most new jobs over the 2006-16 decade," this despite years of worry that high-tech jobs are being shipped abroad. 11. How Deep Can You Probe?, Rita Zeidner, HR Magazine, October 2007 Tales of employers searching Facebook pages notwithstanding, "many states limit the extent to which employers can consider off duty conduct in making a hiring decision..." 12. Privacy, Legislation, and Surveillance Software, G. Daryl Nord, Tipton F. McCubbins, and Jeretta Horn Nord, Communications of the ACM, August 2006 The assumption of employee privacy in the workplace "may be naive." Constitutional protections against unreasonable search and seizure "usually apply only to state actions." UNIT 4: Computers, People, and Social Participation Unit Overview 13. Is Google Making Us Stupid?, Nicholas Carr, The Atlantic, July 2008 Here is one commentator who worries that multitasking is destroying his ability to concentrate. 14. The End of Solitude, William Deresiewicz, The Chronicle Review, The Chronicle of Higher Education, January 30, 2009 What does it mean for the author's sense of closeness "when my Facebook News Feed tells me that Sally Smith (whom I haven't seen since high school, and wasn't all that friendly with even then) 'is making coffee and staring off into space.' " 15. Girl Power, Chuck Salter, Fast Company, September 2007 How does a seventeen-year-old run a million-dollar website? 16. Bloggers against Torture, Negar Azimi, The Nation, February 19, 2007 Authoritarian regimes can't always operate in secret, now that bloggers are writing. 17. It's Not Easy to Stand up to Cyberbullies, but We Must, Robert M. O'Neil, The Chronicle of Higher Education, July 11, 2008 There is very little, says the author, "that concerned institutions (or their besmirched students) can do to clean up their electronic neighborhoods." 18. The Nike Experiment: How the Shoe Giant Unleashed the Power of Personal Metrics, Mark McClusky, Wired, July 2009 What does a ninety-year-old study done at a Western Electric plant have to do with remote sensors, hi-tech sneakers, and social networking sites? Says McClusky, people seem to "change their behavior-often for the better-when they are being observed." 19. Center Stage, Carl Sessions Stepp, American Journalism Review, April/May 2006 How does a newspaper's web version differ from the print version? The web version receives little editing. 20. E-Mail Is for Old People, Dan Carnevale, The Chronicle of Higher Education, October 6, 2006 Reaching students through e-mail has become more difficult as students turn to text messaging and social networking. UNIT 5: Societal Institutions: Law, Politics, Education, and the Military Unit Overview 21. The Coming Robot Army, Steve Featherstone, Harper's Magazine, February 2007 "Within our lifetime," says Featherstone, "robots will give the ability to wage war without committing ourselves to the human cost of actually fighting a war." 22. Google & the Future of Books, Robert Darnton, The New York Review of Books, February 12, 2009 "Four years ago, Google began digitizing books from research libraries," says the director of the Harvard library. No one knows what the consequences will be. 23. Archiving Writers' Work in the Age of E-Mail, Steve Kolowich, The Chronicle of Higher Education, April 10, 2009 The late John Updike's "papers" arrived at Harvard's Houghton Library on floppy disk. The promise and peril of the information age calls for people with the "resourcefulness to retrofit modernity's round holes to accommodate antiquity's square pegs." 24. Wikipedia in the Newsroom, Donna Shaw, American Journalism Review, February/March 2008 Whether professionals can cite a source that is collective and anonymous remains problematic. 25. E-Mail in Academia: Expectations, Use, and Instructional Impact, Meredith Weiss and Dana Hanson-Baldauf, Educause Quarterly, Number 1 2008 Studies have shown that there is a relationship between a student's success and "the quality of one-on-one communication between teacher and student." What happens when you add e-mail to the mix? UNIT 6: Risk and Avoiding Risk Unit Overview 26. A Growing Watch List, Karen DeYoung, The Washington Post National Weekly Edition, April 2-8, 2007 The Terrorist Identities Datamart Environment database contains information on over 450,000 persons, many of them U.S. citizens. What happens if there is an error? 27. The Evolution of Cyber Warfare, Greg Bruno, Backgrounder: Council on Foreign Relations, February 27, 2008 The Department of Homeland Security recorded over 100,000 attacks on military, government, and private computer systems in 2007. 28. Geeks and Hackers, Uncle Sam's Cyber Force Wants You!, William J. Astore, The Nation, June 5, 2008 "Do we really want the military to dominate cyberspace?" asks this retired Air Force Lieutenant Colonel. 29. Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook, Simson Garfinkel, Technology Review, July/August 2009 "Here's a koan for the information age: Why do so many privacy activists have Facebook pages?" asks Garfinkel. The answer is obvious. Social networks are "where the action is." 30. The Software Wars: Why You Can't Understand Your Computer, Paul De Palma, American Scholar, Winter 2005 Excessive complexity and cost overruns make software development like military procurement. 31. False Reporting on the Internet and the Spread of Rumors: Three Case Studies, Paul Hitlin, gnovis, April 26, 2004 Internet news sources can sometimes be unreliable. Paul Hitlin examines Internet coverage of the Vince Foster suicide, along with other stories to understand why this is so. UNIT 7: International Perspectives and Issues Unit Overview 32. China's Tech Generation Finds a New Chairman to Venerate, Kevin Holden, Wired, May 24, 2007 The new China is not a place that would have made Chairman Mao comfortable. One indication is the popularity of Bill Gates. 33. New Tech, Old Habits, Moon Ihlwan and Kenji Hall, BusinessWeek, March 26, 2007 Japan and South Korea are behind the U.S. when it comes to the productivity of information technology workers. The answer may be as simple as telecommuting. 34. Iran's Twitter Revolution? Maybe Not Yet, Joel Schectman, BusinessWeek, June 17, 2009 Media around the world elevated twittering to a revolutionary act this past spring and early summer. Closer examination shows that things are more complex. 35. The List: Look Who's Censoring the Internet Now, Joshua Keating, Foreign Policy, March 2009 We are used to hearing about Internet censors in China and Iran. But Australia and France? 36. Dissent Made Safer: How Anonymity Technology Could Save Free Speech on the Internet, David Talbot, Technology Review, August 15, 2009 Tariq Biasi of Syria is spending three years in prison for "dwindling the national feeling." Systems like Tor, "an open-source anonymity system," can help dissidents in Zimbabwe and ordinary web surfers anywhere evade censorship. UNIT 8: The Frontier of Computing Unit Overview 37. A Nascent Robotics Culture: New Complicities for Companionship, Sherry Turkle, AAAI Technical Report, July 2006 "What is a robot kind of love?" and "What will we be like, what kind of people are we becoming as we develop increasingly intimate relationships with machines?" MIT's pioneering sociologist tries to answer both questions. 38. Toward Nature-Inspired Computing, Jiming Liu and K. C. Tsui, Communications of the ACM, October 2006 Computer scientists are turning to biology as a source of inspiration for models of complex systems. These biological models change the rules for governing systems behavior. 39. Google and the Wisdom of Clouds, Stephen Baker, BusinessWeek, December 24, 2007 Google is teaching researchers around the world how to extract patterns using clusters of computers that it calls "the cloud." 40. Cloud Computing, Brian Hayes, Communications of the ACM, July 2008 "... the sudden stylishness of the cloud paradigm" is an odd return to a mode of computing developed fifty years ago. The more things change ... 41. The Coming Superbrain, John Markoff, The New York Times, May 24, 2009 Artificial Intelligence, often criticized for making failed promises, is back with a vengeance. Watch out for the singularity, opening at a theatre near you. Test-Your-Knowledge Form Article Rating Form

EAN: 9780073528588
ISBN: 0073528587
Publisher: McGraw-Hill Professional
Dimensions: 21.08 x 1.27 x 27.18 centimetres (0.39 kg)
Tell a friend

Their Email:

Sell Yours

Already own this item?
Sell Yours and earn some cash. It's fast and free to list! (Learn More.)

Review this Product

BAD GOOD
 

Related Searches

 

Webmasters, Bloggers & Website Owners

You can earn a 5% commission by selling Annual Editions: Computers in Society 10/11 (Annual Editions: Computers in Society) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep!

 

Authors/Publishers

Are you the Author/Publisher? Improve sales by submitting additional information on this title.