The readings, if you go out more than a lecture or two, are almost certainly wrong.
- Jan 20
Introduction; Administrative Issues
- Text, Chapter 1
- Jan 25
- Paul Berg, David Baltimore, Sydney Brenner, Richard O. Roblin, and Maxine F. Singer. Summary statement of the Asilomar Conference on Recombinant DNA Molecules. 72(6):1981--1984, June 1975. [ .pdf ]
- Philip M. Boffey. Software seen as obstacle in developing `Star Wars'. New York Times, September 16, 1986. [ .html ]
- Text, chapter 9
- U.S. Public Health Service Syphilis Study at Tuskegee", Center for Disease Control.
- Institutional Review Board Guidebook, Introduction, Office of Human Subjects Research, Department of Health and Human Services.
- Patent GB630726, "Improvements in or relating to the transmutation of chemical elements", March 30, 1936 (optional)
- Jan 27
- David L. Parnas. Software aspects of strategic defense systems. Communications of the ACM, 28(12), December 1985. [ http ]
- Stanley Fish. Why we built the ivory tower. New York Times, May 21, 2004. [ http ]
- Kim Zetter. A unprecedented look at Stuxnet, the world's first digital weapon. Wired, November 3, 2014. [ http ]
- Phillip Rogaway. The moral character of cryptographic work, 2015. [ .pdf ]
- David Kravets. Ethics charges filed against DOJ lawyer who exposed Bush-era surveillance. Ars Technica, January 26, 2016. [ http ]
- Howard Berkes. 30 years after disaster, challenger engineer still blames himself. NPR, January 28, 2016. [ http ]
- John Markoff. Apple's engineers, if defiant, would be in sync with ethics code. New York Times, March 18, 2016. [ .html ]
- Howard Berkes. Challenger engineer who warned of shuttle disaster dies. NPR, March 21, 2016. [ http ]
- ACM Code of Ethis
- ACM Software Engineering Code of Ethics
- IEEE Code of Ethics
- SAGE/LOPSA/Usenix System Administrators' Code of Ethics
- Feb 01
Corporations and Ethics
- Chloe Albanesius. Hp responds to claim of `racist' webcams. PC Magazine, December 22, 2009. [ http ]
- Michael Schrage. Big data's dangerous new era of discrimination. Harvard Business Review, January 29, 2014. [ http ]
- Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, and Huang Lin. Discovering unwarranted associations in data-driven applications with the FairTest testing toolkit, 2015. [ http ]
- Jacob Brogan. Google scrambles after software ids photo of two black people as `gorillas'. Slate (Future Tense blog), June 30, 2015. [ .html ]
- Amit Datta, Michael Carl Tschantz, and Anupam Datta. Automated experiments on ad privacy settings: A tale of opacity, choice, and discrimination. In Proceedings of Privacy Enhancing Technologies Symposium,, July 2015. [ .pdf ]
- Jonathan M. Gitlin. VW says rulebreaking culture at root of emissions scandal. Ars Technica, December 10, 2015. [ http ]
- Roland L. Trope and Eugene K. Ressler. Mettle fatigue: VW's single-point-of-failure ethics. IEEE Computer, 14(1):12--30, Jan--Feb 2016. [ .pdf ]
- Danielle Ivory and Hiroko Tabuchijan. Takata emails show brash exchanges about data tampering. New York Times, January 4, 2016. [ http ]
- Nicholas Diakopoulos. Accountability in algorithmic decision-making. ACMqueue, January 25, 2016. [ http ]
- Megan Geuss. Volkswagen details what top management knew leading up to emissions revelations. Ars Technica, March 3, 2016. [ http ]
- Clare Garvie and Jonathan Frankle. Facial-recognition software might have a racial bias problem. Atlantic, April 2016. [ http ]
- Executive Office of the President. Big data: A report on algorithmic systems, May 2016. [ .pdf ]
- Feb 03
Risks of Computers
- Jon Fingas. Google self-driving car crashes into a bus. Engadget, February 29, 2016. [ http ]
- Textbook, chapter 8
- An Experimental Evaluation of the Assumption of Independence in Multi-Version Programming, John Knight and Nancy Leveson, IEEE Transactions on Software Engineering SE-12:1, January 1986, pp. 96-109.
- Analysis of faults in an N-version software experiment, S.S. Brilliant, J.C. Knight, and N.G. Leveson, IEEE Transactions on Software Engineering 16:2, February 1990. (optional)
- The Bug Heard 'Round the World, Jack Garman, ACM Software Engineering Notes, October, 1981, pp. 3-10.
- Vulnerabilities of network control protocols: an example, Eric C. Rosen, ACM SIGCOMM Computer Communication Review 11:3, July 1981.
- Space Shuttle Computers and Avionics (optional)
- Who Needs Hackers?, John Schwartz, New York Times, September 12, 2007.
- Technical background on AT&T's network slowdown, January 15, 1990
- Going Ballistic! A hacker tourist explores the deep recesses of fabled Air Force stronghold Cheyenne Mountain, where the Cold War never stops., Phil Patton, Wired magazine 7:11, November 1999.
- 20 Mishaps That Might Have Started Accidental Nuclear War, Alan F. Phillips. See #18 and #19.
- 'I Had A Funny Feeling in My Gut', David Hoffman, Washington Post Foreign Service, February 10, 1999.
- History's Worst Software Bugs, Simson Garfinkel, Wired magazine, November 2005.
- 50 Plus Blue Screen of Death Displays in Public, Hiroshi, 14 June 2009.
- An ACM Digital Library error, which I got while working on this lecture...
- Google let root certificate for Gmail expire, causing e-mail hiccups, Sam Gallagher, Ars Technica, 6 April 2015.
- How Medical Tech Gave a Patient a Massive Overdose, Bob Wachter, How Medical Tech Gave a Patient a Massive Overdose", The Medium, 30 March 2015.
- Qantas 737 “tailstrike” was caused by iPad data entry fail, Ars Technica, Nov 16, 2015.
- Feb 08
- Steve Ragan. Ransomware takes Hollywood hospital offline, $3.6m demanded by attackers. CSO Online, February 14, 2016. [ .html ]
- Hacking the Hill, Shane Harris, National Journal Magazine, Dec. 20, 2008.
- Researchers Trace Data Theft to Intruders in China, John Markoff and David Barboza, New York Times, April 5, 2010.
- French media groups to hold emergency meeting after Isis cyber-attack, Angelique Chrisafis and Samuel Gibbs, The Guardian, 9 April 2015.
- Russians Hacked White House Via State Department, Claims Report, Thomas Fox-Brewster, Forbes, 8 April 2015.
- An Unprecedented Look at Stuxnet, the World's First Digital Weapon, Kim Zetter, Wired, 3 November 2014.
- Feb 10
Risks: Electronic Voting Machines
- Analysis of an Electronic Voting System, Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, Proc. IEEE Symposium on Security and Privacy (May, 2004).
- Project EVEREST Evaluation and Validation of Election Related Equipment, Standards and Testing, December 2007 (optional).
- Top-to-Bottom Review (optional)
- Hacking Democracy, HBO film (optional)
- Feb 15
Risks: What Do We Do?
- James C. McGroddy and Herbert S. Lin, editors. The FBI's Trilogy Information Technology Modernization Program---Summary. National Academies, May 2004. [ http ]
- Eric Knorr. Anatomy of an IT disaster: How the FBI blew it. InfoWorld, March 21, 2005. [ .html ]
- Susan Carey. United's merger turbulence hits elite frequent fliers. Wall Street Journal, May 24, 2012. [ http ]
- J.W. Israel. Why the FBI can't build a case management system. Computer, 45(6):73--80, June 2012. [ http ]
- Nathaniel Popper and Neil Goughapril. Bloomberg terminals suffer widespread failures. New York Times, April 17, 2015. [ .html ]
- Feb 17
What is Privacy?
- David Brin. The transparent society. Wired, December 1, 1996. [ http ]
- Andrea Peterson. Verizon Wireless to allow customers to actually opt-out of controversial supercookie tracking. Washington Post, January 30, 2015. [ http ]
- Chris Frey. Revealed: how facial recognition has invaded shops---and your privacy. Guardian, March 3, 2016. [ http ] Cyberspace Privacy: A Primer and Proposal, Jerry Kang, Human Rights Magazine 26:1, Winter 1999.
- The Right to Privacy, Samuel Warren and Louis D. Brandeis, 4 Harvard Law Review 193 (1890)
- The Perfect Scan
- Dr. Fun
- What's in the driver's license bar code?
- Textbook, chapter 2
- Feb 22
- Social Networks
- Feb 24
- Machine Learning (guest lecturer)
- Feb 29
- January W. Payne. Hey, you're breaking up on me! Washington Post, February 13, 2007. [ .html ]
- Kim Zetter. Judge acquits Lori Drew in cyberbullying case, overrules jury. Wired, July 2, 2007. [ http ]
- Kevin Poulsen. Hackers assault epilepsy patients via computer. Wired, March 28, 2008. [ http ]
- Danielle Citron. Law's expressive value in combating cyber gender harassment. Michigan Law Review, 108:373--416, 2009. (Optional). [ http ]
- Charles H. Antin. The boundaries of a breakup. New York Times, November 20, 2009. [ .html ]
- Bruce Bower. Facebook users keep it real in online profiles. Science News, February 26, 2010. [ http ]
- Beth Teitell and Callum Borchers. GamerGate anger at women all too real for gamemaker. Boston Globe, October 30 2014. [ .html ]
- Jonathan Mahler. Who spewed that abuse? anonymous Yik Yak app isn't telling. New York Times, March 8, 2015. [ http ]
- Miranda Katz. 2 long island teens arrested, 20 suspended over sexting incident. Gothamist, November 10, 2015. [ http ]
- Justin Jouvenal. A 12-year-old girl is facing criminal charges for using emoji, and she's not the only one. Washington Post, February 27, 2016. [ http ]
- Penelope Green. The Facebook breakup. New York Times, March 12, 2016. [ .html ]
- Caitlin Dewey. In the battle of Internet mobs vs. the law, the Internet mobs have won. Washington Post, February 17, 2017. [ http ]
- Mar 02
Wiretapping and Eavesdropping
- Steven M. Bellovin. Wiretapping the Net. The Bridge, 20(2):21--26, Summer 2000. [ .pdf ]
- Steven M. Bellovin, Matt Blaze, Ernest Brickell, Clinton Brooks, Vint Cerf, Whitfield Diffie, Susan Landau, Jon Peterson, and John Treichler. Security implications of applying the Communications Assistance to Law Enforcement Act to Voice over IP, 2006. [ .pdf ]
- Vassilis Prevelakis and Diomidis Spinellis. The Athens affair. IEEE Spectrum, 44(7):26--33, July 2007. [ http ]
- Elizabeth Weise. Hey, Siri and Alexa: Let's talk privacy practices. USA Today, March 2, 2016. [ http ]
- Katz v. United States, 389 U.S. 347 (1967). Read all five opinions.
- Smith v. Maryland, 442 U.S. 735 (1979).
- Mar 07
The Crypto Wars
- Kenneth W. Dam and Herbert S. Lin, editors. Cryptography's Role in Securing the Information Society. National Academy Press, Washington, D.C., 1996. Executive summary only. [ http ]
- Whitfield Diffie and Susan Landau. Privacy on the Line. MIT Press, Cambridge, MA, second edition, 2007. Preface, Introduction, Conclusions. [ .pdf ]
- Bruce Schneier. Did NSA put a secret backdoor in new encryption standard? Wired, November 15, 2007. [ http ]
- Matt Blaze. Key escrow from a safe distance: Looking back at the Clipper Chip. In Proceedings of ACSAC '11, 2011. [ .pdf ]
- Matthew Green. Why can't Apple decrypt your iPhone? A Few Thoughts on Cryptographic Engineering, October 4, 2014. [ .html ]
- Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner. Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), September 2015. [ DOI | http ]
- Sheri Pym. In the matter of the search of an Apple iPhone seized during the execution of a search warrant on a black Lexus IS300, California license plate 35KGD203. United States District Court, Central District of California, February 16, 2016. No. ED 15-0451M. [ .pdf ]
- Kashmir Hill. Apple's battle with the FBI: All your questions answered. Fusion, February 22, 2016. [ http ]
- James Orenstein. In re order requiring Apple, Inc. to assist in the execution of a search warrant issued by this court. United States District Court, Eastern District of New York, February 29, 2016. Case 1:15-mc-01902-JO, Document 29. [ .pdf ]
- Susan Landau. Testimony for House Judiciary Committee hearing on “The Encryption Tightrope: Balancing Americans' security and privacy”, March 2016. [ .pdf ]
- "My life as an international arms courier", Matt Blaze, January, 1995.
- "Notes on key escrow meeting with NSA", Matt Blaze, February 2, 1994
- "Report of the Manhattan District Attorney's Office on Smartphone Encryption and Public Safety", November 2015
- Mar 09
- Kim Zetter. Everything we know about ukraine's power plant hack. Wired, January 20, 2016. [ http ]
- Sean Gallagher. US military launches cyber attacks on ISIS in Mosul, and announces it. Ars Technica, March 1, 2016. [ http ]
- David E. Sanger. Utilities cautioned about potential for a cyberattack after Ukraine's. New York Times, March 1, 2016. [ .html ]
- Kim Zetter. Inside the cunning, unprecedented hack of Ukraine's power grid. Wired, March 3, 2016. [ http ]
- Mar 21
The Dark Web
- P F Syverson, D M Goldschlag, and M G Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, pages 44--54, Oakland, California, 4--7 1997. [ .html ]
- Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, August 2004. [ http ]
- Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2009. [ .pdf ]
- Andy Greenberg. Why Facebook just launched its own `Dark Web' site. Wired, October 31, 2014. [ http ]
- Carl Franzen. Facebook just created a new Tor link for users who wish to remain anonymous. The Verge, October 31, 2014. [ http ]
- Alec D. E. Muffett. Making connections to Facebook more secure. Facebook, October 31, 2014. [ http ]
- Joshuah Bearman and Tomer Hanuka. The rise & fall of Silk Road, Part I. Wired, April 2015. [ http ]
- Joshuah Bearman and Tomer Hanuka. The rise & fall of Silk Road, Part II. Wired, May 2015. [ http ]
- Cyrus Farivar and Sean Gallagher. Feds bust through huge Tor-hidden child porn site using questionable malware. Ars Technica, July 16, 2015. [ http ]
- Joseph Cox. The FBI's `unprecedented” hacking campaign targeted over a thousand computers. Vice, January 5, 2016. [ http ]
- Nick Hagar, Geordan Tilley, Alex Duner, and Nicolas Rivero. A wave of non-criminal users is joining the dark web and stepping into the middle of a privacy battle. Caught in the Crossfire, March 10, 2016. [ http ]
- Tor: Hidden Service Protocol
- Facebook, hidden services, and https certs.
- Tor: Overview
- Mar 23
Freedom of Speech
- Catherine Buni and Soraya Chemaly. The secret rules of the Internet. Verge, April 13, 2016. [ http ]
- Michael Nunez. Former facebook workers: We routinely suppressed conservative news. Gizmodo, May 9, 2016. [ http ]
- Text, chapter 3
- ACLU v. Reno, 929 F. Supp. 824 (1996)
- EFF article on Sapient v. Geller
- EFF article on Online Policy Group v. Diebold
- Rulings Leave Online Student Speech Rights Unresolved, Wired Threat Level blog, Feb. 4, 2010.
- Mar 28
Freedom of Speech: Anonymity
- Sabine Helmers. A brief history of anon.penet.fi---the legendary anonymous remailer. CMC Magazine, September 1997. [ .html ]
- Carter Jernigan and Behram F.T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, October 5, 2009. [ http ]
- Sara Baker. Why online anonymity is critical for women. WMC Speech Project, March 11, 2016. [ http ]
- Karen Turner. ass surveillance silences minority opinions, according to study. Washington Post, March 28, 2016. [ http ]
- McIntyre v. Ohio Election Commission, 514 U.S. 334 (1995)
- TALLEY v. CALIFORNIA, 362 U.S. 60 (1960)
- Mar 30
Freedom of Speech: Accountability
- Nitasha Tiku and Casey Newton. Twitter ceo: 'we suck at dealing with abuse'. The Verge, February 4, 2015. [ http ]
- Kristen V. Brown. How Twitter treated death threats against me. March 22, 2016. [ http ]
Linkages for Good, blog posting, Dec 31, 2007.
- Cyber Civil Rights, Danielle Citron, 89 Boston University Law Review 61 (2009).
- Anonymity and traceability in cyberspace, Richard Clayton, PhD dissertation, University of Cambridge, November 2005, technical report UCAM-CL-TR-653—read Chapter 3.
- Apr 04
Freedom of Speech: Crossing Borders
- Aamna Mohdin. Facebook, Google, and Twitter have agreed to apply Germany's strict anti-hate speech law online. Quartz, December 16, 2015. [ http ]
- Tetyana Lokot. Twitter reports massive increase in Russian government's content removal requests. Global Voices, March 6, 2016. [ http ]
- Mark Scott. Google fined by French privacy regulator. New York Times, March 24, 2016. [ .html ]
- Robert Mackey. Turkey wants ban on mocking its leader enforced abroad too. The Intercept, March 30, 2016. [ http ]
- Colin George. Angela Wrightson murder: How the media fought to report the case. BBC News, April 7, 2016. [ http ]
- Britain, Long a Libel Mecca, Reviews Laws, Sarah Lyall, New York Times, 10 December 2009.
- Threat to Web Freedom Seen in Italian Google Case, Rachel Donadio, New York Times, 24 Febuary 2010.
- Pretrial Publicity
- Dow Jones & Company Inc. v Gutnick (2002), HCA 56 (10 December 2002). (skim)
- Apr 06
- Anderson J. Duff. `Let's take a #selfie,' said the monkey: A case of questionable copyrights. Wired, September 2014. [ http ]
- Ted Johnson. Sherlock Holmes to remain in public domain after Supreme Court declines case. Variety, November 3, 2014. [ http ]
- Jonathan Bailey. Peter Pan and the copyright that never grew up. Plagiarism Today, October 21, 2015. [ http ]
- Erik Stallman. A qualified win for cybersecurity researchers in DMCA triennial rulemaking. CDT Blog, October 27, 2015. [ http ]
- Camila Domonoske. Monkey can't own copyright to his selfie, federal judge says. NPR, January 7, 2016. [ http ]
- Zachary Crockett. How Mickey Mouse evades the public domain. Priceonomics, January 7, 2016. [ http ]
- Kevin Smith. Some radical thoughts about Sci-Hub. Scholarly Communications @ Duke, March 3, 2016. [ http ]
- Textbook, chapter 4
- NFL/DMCA, Wendy Seltzer's blog
- Death by DMCA, Fred von Lohmann and Wendy Seltzer, IEEE Spectrum, June 2006
- Frequently Asked Questions about Copyright (skim)
- Columbia Copyright Advisory Office
- A.V. v. iParadigms, 562 F.3d 630 (optional)
- Creative Commons
- Apr 11
(guest lecture: Eugene Goryunov)
- Math of Publishing Meets the E-Book, New York Times, Feb 28, 2010.
- Entertainment Industry Asks White House for Vast New Internet Monitoring, Filtering, and Takedown Powers, Lauren Weinstein's blog, 25 March 2010.
- Method of exercising a cat, Kevin T. Amiss and Martin H. Abbott, U.S. patent 5,443,036, issued Aug 22, 1995.
- Business method protecting jokes, Timothy Wace Roberts, U.S. patent application 10/569,506, filed Aug 24, 2004. (skim).
- What is a Patent?, up to but not including the section titled "The United States Patent And Trademark Office"
- For Texas Instruments, Calculator Hackers Don't Add Up, D. Kushner, IEEE Spectrum 46:12, December 2009.
- Unintended Consequences: Sixteen Years under the DMCA, Electronic Frontier Foundation, September 2014. (optional)
- Coloring Book of Patents (optional)
- Apr 13
Patents; Trade Secrets
- Kathleen Day. 3 accused in theft of Coke secrets. Washington Post, July 6, 2006. [ .html ]
- Ben Lee. Twitter's surprising solution to the patent problem: Let employees control them. Wired, February 21, 2013. [ http ]
- The Cathedral and the Bazaar, Eric S. Raymond.
- Blackberries and Barnyards: Patent Trolls and the Perils of Innovation, Gerard N. Magliocca, Notre Dame Law Review 82, no. 5 (2007): 1809-1838 (optional)
- The Oldest Algorithmic Patent?, blog post, Steven M. Bellovin, 21 May 2013.
- W3C Patent Policy, 5 February 2004 (skim)
- App developers withdraw from US as patent fears reach 'tipping point', Charles Arthur, The Guardian, 15 July 2011.
- Software patents—Obstacles to software development, Richard Stallman, 25 March 2002.
- "Trade Secret Protection for Source Code", July 17, 2001, Belinda M. Juran
- Apr 18
Intellectual Property: Trademarks
- Rebecca Tushnet. Uber and out: court grants limited but still tricky injunction against Uber. Rebecca Tushnet's 43(B)log, February 18 2016. [ .html ]
- David Kravets. A spiritual successor to Aaron Swartz is angering publishers all over again. Ars Technica, April 3, 2016. [ http ]
- David Post. Stairway to (copyright) Heaven. Volokh Conspiracy, April 13, 2016. [ http ]
- David Post. Who owns `We Shall Overcome''? Volokh Conspiracy, April 15, 2016. [ http ]
- Ryan Merkley. You pay to read research you fund. that's ludicrous. Wired, April 18, 2016. [ http ]
- How to Choose a License for Your Work
- Filching a Good Name for Internet Use?, New York Times, 21 March 2010
- Billions Registered, Joshua Quittner, Wired Magazine 2:10, October 1994.
- From TedCruz.ca to TaylorSwift.porn: How the golden age of domain-trolling was born, Caitlin Dewey, Washington Post, 25 March 2015.
- Apr 20
- Megan Geuss. Uber drivers are employees, California Labor Commission ruling suggests. Ars Technica, June 17, 2015. [ http ]
- David Kravets. Judge calls Uber algorithm “genius,” green-lights surge-pricing lawsuit. Ars Technica, 2016. [ http ]
- Sam Machkovech. Report: Robots, other advances will cost humans 5.1 million jobs by 2020. Ars Technica, January 18, 2016. [ http ]
- Cora Lewis and Johana Bhuiyan. What striking Uber drivers are up against. BuzzFeed, February 9, 2016. [ http ]
- Jed Kolko. Republican-leaning cities are at greater risk of job automation. FiveThirtyEIght, February 17, 2016. [ http ]
- David Kravets. Appeals court halts class action on whether Uber drivers are employees. Ars Technica, April 6, 2016. [ http ]
- Moshe Y. Vardi. Are robots job creators? New Republic, April 6, 2016. [ http ]
- Ángel González. Hands, heads and robots work in sync at Amazon warehouses. Seattle Times, April 9, 2016. [ http ]
- Cyrus Farivar. Uber settles class-action labor lawsuits in Massachusetts, California. Ars Technica, April 22, 2016. [ www: ]
- Textbook, chapter 6
- Will Startups Get Squeezed by a Tech Hiring Binge?, Matthew Ingram, New York Times, 16 April 2010
- Debunking the Myths of the Telecommute, Sylvia Marino, New York Times, 16 April 2010
- The Machines Are Coming, Zeynep Tufekci, New York Times, 18 April 2015.
- "What Clever Robots Mean for Jobs", Timothy Aeppel, Wall Street Journal, 24 February 2015. (On Courseworks.)
- Does innovation create or destroy jobs?, Vint Cerf, Communications of the ACM, December 2014.
- Could a lawsuit wreck Uber, Lyft?, Peter Hoge, Upstart Business Journal, 28 March 2015.
- Apr 25
Computers and the Media
- Ravi Somaiya and John Herrman. Mashable announces personnel shifts and job cuts. New York Times, April 7, 2016. [ .html ]
- Dylan Byers. Buzzfeed buzzkill: Its stunning revenue miss goes viral. CNN Money, April 12, 2016. [ .html ]
- John Herrman. Media websites battle faltering ad revenue and traffic. New York Times, April 17, 2016. [ .html ]
- Jim Rutenberg. For news outlets squeezed from the middle, it's bend or bust. New York Times, April 17, 2016. [ .html ]
- Apr 27
Guest lecturer: Prof. Kathy McKeown
- Claire Cain Miller. Out of the loop in Silicon Valley. New York Times, April 18, 2010. [ .html ]
- Dana Liebelson and Tasneem Raja. Donglegate: How one brogrammer's sexist joke led to death threats and firings. Mother Jones, March 22, 2013. [ http ]
- Randy Olson. Percentage of Bachelor's degrees conferred to women, by major (1970-2012). Blog, June 14, 2014. [ http ]
- Beryl Nelson. The data on diversity. Communications of the ACM, 57(11):86--95, November 2014. [ http ]
- Melissa McEwan. The falsest of false equivalencies. Shakesville, February 20, 2015. [ .html ]
- Kristen V. Brown. Women are better at coding than men---if they hide their gender. Fusion, February 11, 2016. [ http ]
- Weiting Liu. These female developers explain how to recruit more female developers. Fast Company, April 6, 2016. [ http ]
- Barriers to the Advancement of Technical Women: A Review of the Literature, Caroline Simard, Anita Borg Institute for Women and Technology, 2007.
- Women in IT: The Facts, by NCWIT, Catherine Ashcraft and Sarah Blithe, National Center for Women & Information Technology (NCWIT), 2009.
- Gender: Integrated Report of Findings, Dawn Nafus, James Leach, and Bernhard Krieger, FLOSSPOLS Project, 2006.
- May 02