Computers in Society

Overview

From McGraw-Hill Contemporary Learning Series (formerly known as McGraw-Hill/Dushkin), this Thirteen Edition of ANNUAL EDITIONS: COMPUTERS IN SOCIETY 06/07 provides convenient, inexpensive access to current articles selected from the best of the public press. Organizational features include: an annotated listing of selected World Wide Web sites; an annotated table of contents; a topic guide; a general introduction; brief overviews for each section; a topical index; and an instructor's resource guide with testing ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (8) from $1.99   
  • New (1) from $60.04   
  • Used (7) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$60.04
Seller since 2008

Feedback rating:

(214)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

From McGraw-Hill Contemporary Learning Series (formerly known as McGraw-Hill/Dushkin), this Thirteen Edition of ANNUAL EDITIONS: COMPUTERS IN SOCIETY 06/07 provides convenient, inexpensive access to current articles selected from the best of the public press. Organizational features include: an annotated listing of selected World Wide Web sites; an annotated table of contents; a topic guide; a general introduction; brief overviews for each section; a topical index; and an instructor's resource guide with testing materials. USING ANNUAL EDITIONS IN THE CLASSROOM is offered as a practical guide for instructors. ANNUAL EDITIONS titles are supported by our student website.
Read More Show Less

Product Details

  • ISBN-13: 9780073528328
  • Publisher: McGraw-Hill Companies, The
  • Publication date: 3/17/2006
  • Series: Annual Editions Ser.
  • Edition description: Older Edition
  • Edition number: 13
  • Pages: 240
  • Product dimensions: 10.60 (w) x 8.20 (h) x 0.60 (d)

Table of Contents

UNIT 1. Introduction
1. Five Things We Need to Know About Technological Change, Neil Postman,
Address to New Tech ’98 Conference, March 27, 1998
Neil Postman, a well-known cultural critic, suggests that
computer technology is too important to be left entirely to the technologists. “Embedded in every technology,” he says, “is a powerful idea….”

2. Whom to Protect and How?, Robert J. Blendon et al.,
Brookings Review, Winter 2001
“The United States,” the authors say, “is now in the second stage of a major
technological transformation” that is changing American life. Some people are calling for more federal
government protection.

3. On the Nature of Computing, Jon Crowcroft,
Communications of the ACM, February 2005
This article has a distinctly different tone than the previous piece. The author states, “
Occupying a third place in human intellectual culture, computing is not bound by the need to describe what does exist (as in natural science) or what can be built in the real world (as in engineering).”

UNIT 2. The Economy
4. The Productivity Paradox, Stephen S. Roach,
The New York Times, November 30, 2003
Ever since some economists began to doubt that computers contribute to a company’s
productivity, others have been trying to prove the opposite. Productivity figures for the past couple of years seem to be on the side of computers. Not so fast, says Stephen Roach, chief economist for MorganStanley.

5. The Big Band Era, Christopher Swope,
Governing, January 2005
Even as cities like Philadelphia are working to transform the
entire city into a wireless hot spot—with government as the internet service provider of last resort—communications companies are fighting to keep local governments out of the
broadband business.

6. The New Gatekeepers, Gregory M. Lamb,
The Christian Science Monitor, May 6, 2004
Of the $35 billion dollars worth of purchases that
search engines generated in 2004, Google accounted for a healthy share. This means that a lot of companies are going to pay Google to be included among
search results.

7. The Software Wars, Paul De Palma,
The American Scholar, Winter 2005
The article argues that
software development is like military procurement, and suffers many of the same woes, including
excessive complexity and cost overruns.

UNIT 3. Work and the Workplace
8. Brain Circulation: How High-Skill Immigration Makes Everyone Better Off, Anna Lee Saxenian,
Brookings Review, Winter 2002
Do
immigrants displace
native workers? Is the United States siphoning off talent from countries that can ill afford to lose it? This Berkeley professor argues that high-skill immigration is more complex than that.

9. Software, Stephen Baker and Manjeet Kripalani,
Business Week Online, March 1, 2004
Highly paid
programming jobs are being outsourced to places like India and other countries with educated workforces who are willing to earn less than Americans.

10. Letter from Silicon Valley, Rebecca Vesely,
The Nation, May 26, 2003
The
recession in Silicon Valley has been difficult for many. Santa Clara County, California combines some of the highest unemployment in the country with some of the highest housing prices.

11. When Long Hours at a Video Game Stop Being Fun, Randall Stross,
The New York Times, November 21, 2004
Though glamour stories of rich Silicon Valley software engineers don’t figure in the American imagination like they did during the salad days of the dot com boom, one is still not quite prepared for this take of
forced overtime.

12. The Computer Evolution, Rob Valletta and Geoffrey Mac Donald,
FRBSF Economic Letter (Federal Reserve Bank of San Francisco), July 23, 2004
This article uses data from several surveys “to examine two key aspects of the computer evolution: the spread of PCs at work and the
evolving wage differentials between individuals who use them and those who do not.”

13. Making Yourself Understood, Stuart Crainer and Des Dearlove,
Across the Board, May/June 2004
In a business environment where half of surveyed managers report spending more than
two hours each day answering email, “it’s never been so easy to be misunderstood.”

UNIT 4. Computers, People, and Social Participation
14. Back-to-School Blogging, Brock Read,
The Chronicle of Higher Education, September 3, 2004
It should surprise no one that entering freshmen, who grew up using the Internet, should turn to
university-sponsored blogs to ease the transition to college life.

15. Structure and Evolution of Blogspace, Ravi Kumar, et al.,
Communications of the ACM, December 2004

Bloggers in the 19-21 age group tend to
be interested in “dorm life, frat parties, college life, my tattoo, pre-med,” while their parents tend to blog about “science fiction, wine, walking, travel, cooking, politics, history, poetry, jazz, writing, reading, and hiking.” Past age 57, however, their interests turn toward cats, poetry, and death.

16. New Technologies and Our Feelings: Romance on the Internet, Christine Rosen,
Current, June 2004
According to Rosen, “our
technologies enable and often promote two
detrimental forces in modern relationships: the demand for total transparency and a bias toward the oversharing of personal information.”

17. From Virtual Communities to Smart Mobs, Lane Jennings,
The Futurist, May/June 2003
Would you wear a computer helmet that would let you
filter out the “
ever-greater intrusions by government and business” on your “personal space and freedom?” What is the cost of not having such an item?

18. Making Meaning: As Google Goes, So Goes the Nation, Geoffrey Nunberg,
The New York Times, May 18, 2003
How
Google ranks web sites may mislead us into thinking that what is popular is also true.

19. Conquered by Google: A Legendary Literature Quiz, Noam Cohen,
The New York Times, May 1, 2005
Even the Author, of the
Times Literary Supplement is falling prey to the power of Google.

UNIT 5. Societal Institutions: Law, Politics, Education, and the Military
20. The Copyright Paradox, Jonathan Band,
Brookings Review, Winter 2001
According to the author, “the problem with
piracy is not the inadequacy of existing laws, but the high cost of enforcing any law against the large universe of infringers.”

21. You Bought It. Who Controls It?, Edward Tenner,
Technology Review, June 2003
Manufacturers are exercising increasing
control over their products after they have left the store. Users gain
security at the price of freedom.

22. Electronic Voting Systems: the Good, the Bad, and the Stupid, Barbara Simons,
QUEUE, October 2004
After being told that
electronic voting machines were inexpensive to run and reliable, election officials have had to learn something that all software developers know: “the testing and certification processes are suspect, and the software is far from bug-free.”

23. Small Vote Manipulations Can Swing Elections, Anthony Di Franco, et al.,
Communications of the ACM, October 2004
According to the authors, “
E-voting machines potentially make
electoral fraud unprecedentedly simple. An election saboteur need only introduce a small change in the master copy of the voting software to be effective.”

24. To Size Up Colleges, Students Now Shop Online, Dan Carnevale,
The Chronicle of Higher Education, June 10, 2005
The same generation of students who buy jeans online “are turning out to be equally
sophisticated consumers of college information.”

25. Facing Down the E-Maelstrom, Jeffrey Selingo,
The Chronicle of Higher Education, April 29, 2005
Never an easy job,
leading a college in the age of the Internet requires sifting through email, reading blogs, and fending off criticism whose volume would be inconceivable without networked computers.

26. Point, Click…Fire, John Carey, Spencer E. Ante, Frederik Balfour, Laura Cohn, and Stan Crock,
Business Week Online, April 7, 2003
“Whatever the problems,” write the authors, “the move to automate war has become an irreversible force.”

27. The Doctrine of Digital War, Stan Crock, Paul Magnusson, Lee Walczak, and Frederik Balfour,
Business Week Online, April 7, 2003
“What’s being tested in Iraq is not just the mettle of the U.S. military but an entire
philosophy of warfare,” say the authors. Is it true that large numbers of land troops aren’t “always needed in an era when powerful
networked-computing systems…can do much of the work?”

UNIT 6. Risk
28. Why Spyware Poses Multiple Threats to Security, Roger Thompson,
Communications of the ACM, August 2005
Harm caused by
spyware ranges from gobbling up computer speed on your PC to enlisting your machine in attacks that can disrupt major businesses or the government.

29. Terror’s Server, David Talbot,
Technology Review, February 2005
“Most experts agree,” says the author, “that the Internet is not just a
tool of terrorist organizations, but is central to their operations.”

30. Homeland Insecurity, Charles C. Mann,
The Atlantic Monthly, September 2002
Charles Mann learns from computer security expert Bruce Schneier that “the trick is to remember that technology can’t save you.”

31. The Virus Underground, Clive Thompson,
The New York Times Magazine, February 8, 2004
Clive Thompson states, “when Mario is bored…he likes to sit at his laptop and create computer
viruses and
worms.”

32. The Fading Memory of the State, David Talbot,
Technology Review, July 2005

Government documents, from the 38 million emails generated by the Clinton administration to electronic records of the 1989 invasion of Panama,
are on disintegrating electronic media, stored using now obsolete formats.

33. False Reporting on the Internet and the Spread of Rumors: Three Case Studies, Paul Hitlin,
Gnovis, April 26, 2004

Internet news sources can sometimes be unreliable. Paul Hitlin examines Internet coverage of the
Vince Foster suicide along with other stories to understand just why this is so.

34. The Level of Discourse Continues to Slide, John Schwartz,
The New York Times, September 28, 2003
Sometimes the
risks of computing are found in unlikely places. Critics complain that a
slide show presentation underplayed the dangers facing the
Columbia space shuttle.

UNIT 7. International Perspectives and Issues
35. China’s Computer Wasteland, Benjamin Joffe-Walt,
The Progressive, January 30, 2005
What to do with the
detritus of the digital age is a growing problem. Shipping it to China seems to be one solution.

36. The New Face of the Silicon Age, Daniel H. Pink,
Wired, February 12, 2004
This piece on
Indian programmers should be enough to keep chairs of American computer science departments awake at night.

37. Restoring the Popularity of Computer Science, David A. Patterson,
Communications of the ACM, September 2005
While India turns out more and more programmers willing to work for a fraction of their American counterparts,
enrollment in computer science across the United States is dropping. The author believes that “inaccurate impressions of opportunities” are behind the decline.

38. Dot Com for Dictators, Shanthi Kalathil,
Foreign Policy, March/April 2003
According to Shanthi Kalathil, “many
authoritarian regimes have realized that adapting to the information age means
relinquishing a measure of control.”

39. Weaving the Authoritarian Web, Taylor C. Boas,
Current History, December 2004
“Far from trying to regulate the Internet by merely restriction diffusion,” says Boas, “
authoritarian countries such as China and Saudi Arabia are employing both technological and institutional means to
control use of the Internet while also encouraging its growth.”

40. Kabul’s Cyber Cafe Culture, Sanjoy Majumder,
BBC News Online, June 13, 2003
Afghans are beginning to go online in
Internet cafes.

41. Japan’s Generation of Computer Refuseniks, Tim Clark,
Japan Media Review, April 3, 2004

Japanese youth appear to be foresaking computers for
cell phones.

UNIT 8. The Frontier of Computing
42. Minding Your Business, Peter Weiss,
Science News, May 3, 2003

Digital assistants may one day help us control the
flood of information.

43. Why Listening Will Never Be the Same, Terry Teachout,
Commentary, September 2002

Digitized music and high-speed networks are putting an
end to records and record stores.

44. The Intelligent Internet, William E. Halal,
The Futurist, March/April 2004
The author claims the
Internet will be the “main method used in 30% of courses” by 2014. As with all predictions, enjoy, but read critically.

45. Sparking the Fire of Invention, Evan I. Schwartz,
Technology Review, May 2004

Nahan Myhrvold, former chief technology officer of Microsoft Research has a new venture. Its mission is “to invent what…inventors believe should be—or can be—invented.”

46. Mind Control, Richard Martin,
Wired, March 2005
What does a quadriplegic young man who plays pong have in common with a monkey mentally moving a joy stick and “soldier-controlled killer robots?” The answer:
Brain Computer Interface or BCI.
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)