4,131
Views
0
CrossRef citations to date
0
Altmetric
Articles

From closed world discourse to digital utopianism: the changing face of responsible computing at Computer Professionals for Social Responsibility (1981–1992)

& ORCID Icon
Pages 6-31 | Received 22 Aug 2019, Accepted 29 Jan 2020, Published online: 02 Mar 2020

References

  • 1990 CPSR Annual Meeting Held at Stanford University. (1990). The CPSR Newsletter, 8(4), 26.
  • A New Era. (1991). Bulletin of the Atomic Scientists, 47(10), 3.
  • Abbate, J. (2000). Inventing the internet. Cambridge, MA: MIT Press.
  • Barbrook, R., & Cameron, A. (1996). The Californian ideology. Science as Culture, 6(1), 44–72. 10/dqj9c5. doi:10.1080/09505439609526455
  • Barlow, J. P. (1990, Fall). Crime and puzzlement: Desperados of the datasphere. The CPSR Newsletter, 8(4), 1–15.
  • Barlow, J. P. (1996). Declaration of the independence of cyberspace. Retrieved from Electronic Frontier Foundation website: https://www.eff.org/cyberspace-independence.
  • Barlow, Kapor, Wozniak Start Electronic Frontier Foundation. (1990, Fall). The CPSR Newsletter, 8(4), 16–18.
  • Bellin, D., & Chapman, G. (1987). Computers in battle, will they work? (1st ed.). Cambridge: Harcourt Brace Jovanovich.
  • Benjamin, R. (2019). Race after technology: Abolitionist tools for the New Jim Code. Hoboken, NJ: John Wiley & Sons.
  • Berlin, S. (1987, April 17). Sample talk. [Guidelines for presenting reliability and risk]. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Bødker, S., Ehn, P., Sjögren, D., & Sundblad, Y. (2000). Co-operative design—Perspectives on 20 years with ‘the Scandinavian IT Design Model. Proceedings of NordiCHI, 2000, Stockholm, 22–24.
  • Borning, A. (1984). Computer reliability and nuclear war. International Physicians for the Prevention of Nuclear War Report, 2(3), 16–21.
  • Borning, A. (1987). Computer system reliability and nuclear war. Communications of the ACM, 30(2), 112–131. doi:10.1145/12527.12528
  • Boyer, P. S. (2010). Selling star wars: Ronald Reagan’s strategic defense initiative. In K. Osgood & A. K. Frank (Eds.), Selling war in a media age: The presidency and public opinion in the American century. Gainesville, FL: University Press of Florida.
  • Brosan, R., & Segal, G. (1983, January 3). Machine of the Year [Cover]. Time. Retrieved from http://content.time.com/time/covers/0,16641,19830103,00.html.
  • Campbell-Kelly, M., & Garcia-Swartz, D. D. (2013). The history of the internet: The missing narratives. Journal of Information Technology, 28(1), 18–33. 10/gf6hj8. doi:10.1057/jit.2013.4
  • Castells, M. (1996). The rise of the network society. Maiden, MA: Blackwell.
  • Chapman, G. (1987, December 2). Email to Terry Winograd and Steve Zilles. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Chapman, G. (1991, Winter-Spring). 21st century project helps in SEMATECH campaign. The CPSR Newsletter, 9(4), 34.
  • Chapter Updates. (1995, Winter). The CPSR Newsletter, 13(1), 25.
  • Clement, A., & Van den Besselaar, P. (1993). A retrospective look at PD projects. Communications of the ACM, 36(6), 29–37. 10/dmnj5p. doi:10.1145/153571.163264
  • Computers and Civil Liberties. (1986, Winter). The CPSR Newsletter, 4(1), 1.
  • CPSR/Boston Hosts 1991 Annual Meeting at MIT. (1991, Summer). The CPSR Newsletter, 9(3), 5.
  • CPSR Co-Sponsors Meeting on Encryption, Privacy and Communications. (1991, Winter-Spring). The CPSR Newsletter, 9(1–2), 11.
  • CPSR Global. (1995, Winter). The CPSR Newsletter, 13(1), 4.
  • CPSR NII Report Delivered to the White House. (1994, Winter). The CPSR Newsletter, 11(4), 1–31. & 12(1).
  • CPSR NTB Study Group. (1988). The SDI’s National Test Bed: An Appraisal (No. WS-100-5). Retrieved from Charles Babbage Institute Archives, University of Minnesota Libraries.
  • CPSR Reports on the FBI’s National Crime Information Center. (1989, Spring). The CPSR Newsletter, 7(2), 1–7.
  • CPSR Responds to the Internet Computer Virus. (1989, Winter). The CPSR Newsletter, 7(1), 1–3.
  • CPSR Speakers Bureau Speaker Training Packet. (1987). [The packet included audio transcript of Reliability and Risk, flyers advertising the show, articles about CPSRs positions, and other materials supporting the speakers]. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • CPSR Testifies on SCIC Before House Subcommittee. (1989, Spring). The CPSR Newslette, 7(2), 7–8.
  • CPSR-EFF Public Policy Roundtable Scheduled. (1990, Fall). The CPSR Newsletter, 8(4), 19.
  • Dahl, M. K. (1988). The National Crime Information Center: A Case Study in National Databases (No. CL-100—2). Retrieved from Charles Babbage Institute Archives, University of Minnesota Libraries.
  • Defense Technical Information Center. (1983). DTIC ADA141982: Strategic Computing. New-Generation Computing Technology: A Strategic Plan for its Development and Application to Critical Problems in Defense. Retrieved from http://archive.org/details/DTIC_ADA141982.
  • Driscoll, K., & Paloque-Berges, C. (2017). Searching for missing “net histories”. Internet Histories, 1(1–2), 47–59. doi:10.1080/24701475.2017.1307541
  • Edwards, P. N. (1997). The closed world: Computers and the politics of discourse in cold war America. Cambridge, MA: MIT Press.
  • Feenberg, A. (1992). Subversive rationalization: Technology, power, and democracy. Inquiry, 35(3–4), 301–322. 10/fnv3nt. doi:10.1080/00201749208602296
  • Feenberg, A. (1999). Questioning technology. London: Routledge.
  • Feenberg, A. (2002). Transforming technology: A critical theory revisited. Oxford; New York: Oxford University Press.
  • Fidler, B., & Russell, A. L. (2018). Financial and administrative infrastructure for the early internet: Network maintenance at the defense information systems agency. Technology and Culture, 59(4), 899–924. 10/gf6csd. doi:10.1353/tech.2018.0090
  • Gaillot, A.-D. (2018, April 2). Remembering the ‘70s activist group that tried to save us from the tech industry. Retrieved from The Outline website: https://theoutline.com/post/4029/computer-people-for-peace-history.
  • Gould, L. (1983, summer). CPSR Denied Booth Space at NCC [National Computer Conference]. The CPSR Newsletter, 1(1), 4.
  • Greene, D., Hoffmann, A. L., & Stark, L. (2019). Better, nicer, clearer, fairer: A critical assessment of the movement for ethical artificial intelligence and machine learning. Proceedings of the 52nd Hawaii International Conference on System Sciences. doi:10.24251/HICSS.2019
  • Halloran, R. (1984, October 27). $400 billion price is seen for antimissle plan. New York Times, 26.
  • Halpern, J. (1984, January). Working with technology for peace. Bulletin of the Atomic Scientists, 1–2.
  • Harding, S. (1992). Rethinking standpoint epistemology: What is “strong objectivity?” The Centennial Review, 36(3), 437–470.
  • Heinrich, T. (2002). Cold war armory: Military contracting in Silicon Valley. Enterprise and Society, 3(2), 247–284. doi:10.1093/es/3.2.247
  • Hossfeld, K. J. (1990). “Their Logic against Them”: Contradictions in Sex, Race, and Class in Silicon Valley. In Ward, K. (Ed.). Women Workers and Global Restructuring (pp. 149-178). Ithaca, NY: ILR Press Cornell University.
  • Hubbard, P. (1983, Summer). What is our real focus? [Letter to the Editor]. The CPSR Newsletter, 1(2), 2.
  • Inside CSPR: National News. (1991, Spring). The CPSR Newsletter, 10(1–2), 28.
  • Johnson, J. (1991, February 5). CPSR leadership retreat statements. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Lakoff, S. A., & York, H. F. (1989). A shield in space? Technology, politics, and the strategic defense initiative. Berkeley: University of California Press.
  • Lécuyer, C. (2017). From clean rooms to dirty water: Labor, semiconductor firms, and the struggle over pollution and workplace hazards in Silicon Valley. Information & Culture: A Journal of History, 52(3), 304–333. 10/gfzshx. doi:10.1353/lac.2017.0012
  • Lowen, R. S. (1997). Creating the Cold War university: The transformation of Stanford. Berkeley: University of California Press. doi:10.1086/ahr/103.5.1721
  • Mailland, J., & Driscoll, K. (2017). Minitel: Welcome to the internet. Cambridge, MA: The MIT Press.
  • Matthews, G. (2003). Silicon Valley, women, and the California dream: Gender, class, and opportunity in the twentieth century. Stanford, CA: Stanford University Press.
  • Mayer, B. (2008). Blue-Green coalitions: Fighting for safe workplaces and healthy communities. Ithaca, NY: Cornell University Press.
  • McGrath, L. (1982, November). TASC Force: Facing the social consequences of technology. Los Gatos Magazine, 22.
  • National Information Infrastructure: A Public Interest Opportunity. (1993, Summer). The CPSR Newsletter, 11, 1–5.
  • National Research Council. (1999). Funding a revolution: Government support for computing research. Washington, DC: The National Academies Press.
  • Norman, C. (1987). The dark side of SDI: Technologies being developed as part of the strategic defense initiative will be inherently capable of offensive uses, claim speakers at the AAAS annual meeting. Science, 235(4792), 962–963. 10/cfz4vq.
  • Notes from the CPSR Board. (1991). The CPSR Newsletter, 9(4), 23. (Fall).
  • O’Mara, M. P. (2019). The code: Silicon Valley and the remaking of America. New York: Penguin Press.
  • Office of Technology Assessment. (2014). Strategic defense initiative: Survivability and software. Retrieved from http://muse.jhu.edu/book/34762.
  • Ornstein, S. (1991, February 6). CPSR leadership retreat statements. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Ornstein, S. (2018, July 26). Interview by Quinn DuPont and Megan Finn [oral history, recorded].
  • Ornstein, S., & Gould, L. (1994, November 17). An interview with Severo Ornstein and Laura Gould (B. H. Bruemmer, Interviewer). Woodside, CA: Charles Babbage Institute Archives, University of Minnesota Libraries.
  • Ornstein, S. M., Smith, B. C., & Suchman, L. A. (1984). Strategic computing. Bulletin of the Atomic Scientists, 40(10), 11–15. 10/gf3wdr. doi:10.1080/00963402.1984.11459292
  • Parnas, D. L. (1985a). Artificial intelligence and the strategic defense initiative. University of Victoria. Charles Babbage Institute Archives, University of Minnesota Libraries. (CBI 107, Box 1).
  • Parnas, D. L. (1985b). Can automatic programming solve the SDI software problem. University of Charles Babbage Institute Archives, University of Minnesota Libraries. (CBI 107, Box 1).
  • Parnas, D. L. (1985c). Can program verification make the SDI software reliable. University of Victoria. Charles Babbage Institute Archives, University of Minnesota Libraries. (CBI 107, Box 1).
  • Parnas, D. L. (1985d). Is SDIO An efficient way to fund research. University of Victoria. Charles Babbage Institute Archives, University of Minnesota Libraries. (CBI 107, Box 1).
  • Parnas, D. L. (1985e). The limits of software engineering methods. University of Victoria. Charles Babbage Institute Archives, University of Minnesota Libraries. (CBI 107, Box 1).
  • Parnas, D. L. (1985f). Why conventional software development does not produce reliable programs. University of Victoria. Charles Babbage Institute Archives, University of Minnesota Libraries. (CBI 107, Box 1).
  • Parnas, D. L. (1985g). Why software is unreliable. University of Victoria. Charles Babbage Institute. (CBI 107, Box 1).
  • Parnas, D. L. (1985h). Why the SDI software system will be untrustworthy. University of Victoria. Charles Babbage Institute Archives, University of Minnesota Libraries. (CBI 107, Box 1).
  • Parnas, D. L. (1985i, June 28). Letter to Mr. James H. Offut. [Alan Borning’s papers shared with the authors.]
  • Parnas, D. L. (1986, Spring). Why I won’t work on SDI: One view of professional responsibility. The CPSR Newsletter, 4(2), 1.
  • Pasquale, F. A., & Cockfield, A. J. (2019). Beyond instrumentalism: A substantivist perspective on law, technology, and the digital persona (SSRN Scholarly Paper No. ID 3327607). Retrieved from Social Science Research Network website: https://papers.ssrn.com/abstract=3327607.
  • Pellow, D. N., & Park, L. S.-H. (2002). The Silicon Valley of dreams: Environmental injustice, immigrant workers, and the high-tech global economy. New York, NY: New York University Press.
  • Pierce, B., & Murry, H. (1989, Fall). CPSR/Washington D.C. Hosts 1989 Annual Meeting. The CPSR Newsletter, 7(4), 4.
  • Privacy Concern Raised Over Lotus Marketplace. (1990, Fall). The CPSR Newsletter, 8(4), 31.
  • Reiss, E. (1992). The strategic defense initiative. Cambridge [England]: Cambridge University Press.
  • Rheingold, H. (2000). The virtual community: Homesteading on the electronic frontier. Cambridge, MA: MIT press.
  • Roberts, E. (1989, Fall). From the secretary’s desk. The CPSR Newsletter, 7(4), 23.
  • Roberts, E. (1990, Fall). Notes from the CPSR board. The CPSR Newsletter, 8(4).
  • Roberts, E. (1991, February 28). Symposium on future directions for CPSR, March 23 [Email]. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Roberts, E. (1994, Spring). The President’s column. The CPSR Newsletter, 21(2), 21.
  • Rockefeller Foundation Awards $100,000 to the 21st Century Project. (1990, Summer). The CPSR Newsletter, 9(3).
  • Rockefeller Foundation Funds 21st Century Project Planning Phase. (1990, Fall). The CPSR Newsletter, 8(4), 31.
  • Roland, A., & Shiman, P. (2002). Strategic computing: DARPA and the quest for machine intelligence, 1983-1993. Cambridge, MA: MIT Press.
  • Rosenberg, R. (1986, Fall). Privacy in the computer age. The CPSR Newsletter, 4(4), 12.
  • Saxenian, A. (1994). Regional advantage: Culture and competition in Silicon Valley and Route 128. Cambridge, MA: Harvard University Press.
  • Segerdal, A. (1984, May 10). Taking a moral stand over the nuclear circus. Computing, 24–25.
  • Serving the Community: A Public Interest Vision of the National Information Infrastructure. (1994, Winter). The CPSR Newsletter, 11–12(4–1), 1–10.
  • Siegel, L., Smith, T., & Wilson, R. (1990, Summer). Sematech, Toxics, and U.S. Industrial Policy: Why we are concerned. The CPSR Newsletter, 8(3), 9–13.
  • Smith, B. C. (1982, October 6). CPSR report (very long message). [Email to Antiwar.pa]. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Smith, B. C. (1993). Limits of correctness in computers. In T. R. Colburn, J. H. Fetzer, & T. L. Rankin (Eds.), Program Verification: Fundamental Issues in Computer Science (pp. 275–293). Netherlands: Springer. Retrieved from https://doi.org/10.1007/978-94-011-1793-7_13.
  • Smith, B. C. (2018, July 11). Interview by Quinn DuPont and Megan Finn [oral history, recorded].
  • Stanford University Class of 1970. (1985). Panel discussion of the Vietnam years. Retrieved from https://purl.stanford.edu/qy931tj9913.
  • Statement in Support of Communications Privacy. (1991, Winter-Spring). The CPSR Newsletter, 9(1–2), 11.
  • Stefik, M. (1985). Strategic computing at DARPA: Overview and assessment. Communications of the ACM, 28(7), 690–704. doi:10.1145/3894.3896
  • Steinberg, G. M. (1988). Lost in space: The domestic politics of the strategic defense initiative. Lexington, Massachusetts: Lexington Press.
  • Suchman, L. A. (1982a, July 2). CPSR report (very long message) [Email]. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Suchman, L. A. (1982b, November 24). Meeting with Paul Valentine [Email]. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Suchman, L. A. (1991, February 5). CPSR leadership retreat statements. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Suchman, L. A., & Larson, J. (1983, Summer). Lessons learned. The CPSR Newsletter, 1(1), 3–4.
  • Sy, K. J. (1993, Summer). The NII: What does it mean for libraries. The CPSR Newsletter, 11(2), 5–7.
  • Ten Minutes to Midnight. (1990). Bulletin of the Atomic Scientists, 46(3), 3.
  • Turner, F. (2006). From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise of digital utopianism. Chicago: University of Chicago Press.
  • Winograd, T. (1982, July 1). Email to Laura Gould. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Winograd, T. (1984a, Winter). DARPA strategic computing proposal. The CPSR Newsletter, 2(1), 1.
  • Winograd, T. (1984b, Spring). Some thoughts on military funding. The CPSR Newsletter, 2(2), 1–3.
  • Winograd, T. (1991, February 4). CPSR leadership retreat statements. Retrieved from Stanford University Archives. (Terry Allen Winograd Papers SC1165 Box 22).
  • Winograd, T., & Borning, A. (2016, November). My politics as a technologist: A conversation with Terry Winograd and Alan Borning. Fall Distinguished Lecture presented at the Technology Policy Lab, University of Washington. Technology Policy Lab, University of Washington.