[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Communities of Computing: Computer Science and Society in the ACMNovember 2016
Publisher:
  • Association for Computing Machinery and Morgan & Claypool
ISBN:978-1-970001-87-7
Published:07 November 2016
Pages:
422
Appears In:
ACMACM Books
Skip Bibliometrics Section
Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

“Communities of Computing” is the first book-length history of the Association for Computing Machinery (ACM), founded in 1947 and with a membership today of 100,000 worldwide. It profiles ACM's notable SIGs, active chapters, and individual members, setting ACM's history into a rich social and political context. The book's 12 core chapters are organized into three thematic sections. “Defining the Discipline” examines the 1960s and 1970s when the field of computer science was taking form at the National Science Foundation, Stanford University, and through ACM's notable efforts in education and curriculum standards.

“Broadening the Profession” looks outward into the wider society as ACM engaged with social and political issues-and as members struggled with balancing a focus on scientific issues and awareness of the wider world. Chapters examine the social turbulence surrounding the Vietnam War, debates about the women's movement, efforts for computing and community education, and international issues including professionalization and the Cold War.

“Expanding Research Frontiers” profiles three areas of research activity where ACM members and ACM itself shaped notable advances in computing, including computer graphics, computer security, and hypertext.

Featuring insightful profiles of notable ACM leaders, such as Edmund Berkeley, George Forsythe, Jean Sammet, Peter Denning, and Kelly Gotlieb, and honest assessments of controversial episodes, the volume deals with compelling and complex issues involving ACM and computing. It is not a narrow organizational history of ACM committees and SIGs, although much information about them is given. All chapters are original works of research. Many chapters draw on archival records of ACM's headquarters, ACM SIGs, and ACM leaders. This volume makes a permanent contribution to documenting the history of ACM and understanding its central role in the history of computing.

References

  1. E. J. Aarseth. 1997. Cybertext: Perspectives on Ergodic Literature. Johns Hopkins University Press, Baltimore.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Abbate. 1999. Inventing the Internet. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  3. J. Abbate. 2012. Recoding Gender: Women's Changing Participation in Computing. MIT Press, Cambridge, MA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. H. Abernathy, J. S. Mancino, C. R. Pearson, and D. C. Swiger. 1973. Survey of design goals for operating systems. Operat. Syst. Rev., 7(2): 19–34. DOI: 10.1145/775260.775263.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Akera. 2007. Edmund Berkeley and the origins of ACM. Commun. ACM, 50(5): 30–35. DOI: 10.1145/1230819.1230835.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Akera. 2008. Calculating a Natural World: Scientists, Engineers, and Computers during the Rise of US Cold War Research. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  7. G. Alberts and E. G. Daylight. 2014. Universality versus locality: The Amsterdam style of Algol implementation. IEEE Ann. Hist. Comput., 36(4): 52–63. DOI: 10.1109/MAHC.2014.61.Google ScholarGoogle ScholarCross RefCross Ref
  8. F. L. Alt. 1962. Fifteen years of ACM. Commun. ACM, 5(6): 300–307. DOI: 10.1145/367766.367777.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. The American Association of University Women. 1992. How Schools Shortchange Girls: A Study of Major Findings on Girls and Education. AAUW Educational Foundation, Washington, DC.Google ScholarGoogle Scholar
  10. R. E. Anderson. 1981. EDP auditing in the 1980s: Or the vanishing paper trail. SIGSAC Rev., 1(1): 6–15. DOI: 10.1145/1317419.1317420.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. E. Anderson. 1999. SIGCAS history: The early years. SIGCAS Comput. Soc., 29(4): 4–5. DOI: 10.1145/572199.572200.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Arendt. 1966. On the human condition. In A. M. Hilton and Institute for Cybercultural Research, editors. The Evolving Society: The Proceedings of the First Annual Conference on the Cybercultural Revolution—Cybernetics and Automation, pp. 213–220. Institute for Cybercultural Research, New York.Google ScholarGoogle Scholar
  13. C. Arnst and A. Dooley. July 23, 1975. Majority of women DPers find no job discrimination. Computerworld, pp. 1–4.Google ScholarGoogle Scholar
  14. W. Aspray and B. O. Williams. 1994. Arming American scientists: NSF and the provision of scientific computing facilities for universities, 1950–1973. IEEE Ann. Hist. Comput., 16(4): 60–74.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Aspray. 1986. International diffusion of computer technology, 1945–1955. IEEE Ann. Hist. Comput., 8(4): 351–360. DOI: 10.1109/MAHC.1986.10063.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W. Aspray. 2000. Was early entry a competitive advantage? US universities that entered computing in the 1940s. IEEE Ann. Hist. Comput., 22(3): 42–87. DOI: 10.1109/85.859525.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. Aspray. 2014. Michael Sean Mahoney (1939–2008). IEEE Ann. Hist. Comput., 36(3): 70–79.Google ScholarGoogle ScholarCross RefCross Ref
  18. W. Aspray. 2016. Participation in Computing: The National Science Foundation's Expansionary Programs. Springer International, Basel.Google ScholarGoogle Scholar
  19. W. Asprey and W. Laffan. 1975. Women speak out on DP careers. Datamation, 21(8): 41–44.Google ScholarGoogle Scholar
  20. W. F. Atchison and J. W. Hamblen. 1964. Status of computer sciences curricula in colleges and universities. Commun. ACM, 7(4): 225–227.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. W. F. Atchison. 1981. Computer education, past, present, and future. SIGCSE Bull., 13(4): 2–6. DOI: 10.1145/989306.989307.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. F. Atchison, S. D. Conte, J. W. Hamblen, T. E. Hull, T. A. Keenan, W. B. Kehl, E. J. McCluskey, S. O. Navarro, W. C. Rheinboldt, E. J. Schweppe, W. Viavant, and D. M. Young, Jr. 1968. Curriculum 68: Recommendations for academic programs in computer science: A report of the ACM Curriculum Committee on Computer Science. Commun. ACM, 11(3): 151–197. DOI: 10.1145/362929.362976.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. L. Bailyn. 2003. Academic careers and gender equity: Lessons learned from MIT. Gender, Work Org., 10(2): 137–153. DOI: 10.1111/1468--0432.00008.Google ScholarGoogle ScholarCross RefCross Ref
  24. V. Balasubramanian, M. Bieber, and T. Isakowitz. 1996. Systematic Hypermedia Design. Retrieved from http://archive.nyu.edu/bitstream/2451/14198/1/IS-96--09.pdfGoogle ScholarGoogle Scholar
  25. D. Banta. 2013. Inspiration lost and found. ACM-W CIS Newslett., 4(2): 22–24.Google ScholarGoogle Scholar
  26. J. T. Barber. 2006. The Black Digital Elite. Praeger, Westport, CT.Google ScholarGoogle Scholar
  27. T. Bardini. 2000. Bootstrapping: Douglas Engelbart, Coevolution, and the Origins of Personal Computing. Stanford University Press, Stanford.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. T. Bardini. 2006. Bridging the gulfs: From hypertext to cyberspace. J. Comput.-Mediat. Commun. 3(2). DOI: 10.1111/j.1083--6101.1997.tb00069.Google ScholarGoogle Scholar
  29. M. Bariff. 1981. DP control and standards activities. SIGSAC Rev., 1(1): 20–25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. J. Barker and W. Aspray. 2006. The state of research on girls and IT. In J. McGrath Cohoon and W. Aspray, editors. Women and Information Technology: Research on Underrepresentation, pp. 3–54. MIT Press, Cambridge, MA. DOI: 10.7551/mitpress/9780262033459.003.0001.Google ScholarGoogle Scholar
  31. B. Barnet. 2013. Memory Machines: The Evolution of Hypertext. Anthem Press, London.Google ScholarGoogle Scholar
  32. E. Barrett. 1991. The Society of Text: Hypertext, Hypermedia, and the Social Construction of Information. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  33. M. Bauman. May 14–16, 1969. Computers and the underprivileged. AFIPS '69 (Spring) Proceedings of the May 14–16, 1969, Spring Joint Computer Conference, pp. 35–36. ACM, New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. D. O. Belanger. 1998. Enabling American Innovation: Engineering and the National Science Foundation. Purdue University Press, West Lafayette, IN.Google ScholarGoogle Scholar
  35. D. Bellin. 1985. High school hackers: Heroes or criminals? Comput. Soc., (14 & 15): 16–17. DOI: 10.1145/379486.379507.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Berenson, et al. 2004. Voices of women in a software engineering course: Reflections on collaboration. ACM J. Educ. Resourc. Comput., 4(1): 1–18.Google ScholarGoogle Scholar
  37. T. J. Bergin. 2007. A history of the history of programming languages. Commun. ACM, 50(5): 69–74. DOI: 10.1145/1230819.1230841.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. T. Berners-Lee and M. Fischetti. 1999. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor. Harper, San Francisco.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. A. J. Bernstein. 1971. A programmer training project. Commun. ACM, 14(7): 449–452. DOI: 10.1145/362619.362624.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. M. Bernstein. 1999. Everything is intertwingled: Asking again. In Proceedings of the ACM Conference on Hypertext - Hypertext'99, ACM Press. Retrieved from http://www.eastgate.com/ht99/slides/Welcome.htmGoogle ScholarGoogle Scholar
  41. K. W. Beyer. 2009. Grace Hopper and the Invention of the Information Age. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  42. A. S. Bix. 2013. Girls Coming to Tech! A History of American Engineering Education for Women. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  43. A. Blackwell and K. Rodden. 2003/1963. Preface to this electronic edition. In Sketchpad: A Man-machine Graphical Communication System. Cambridge University Online.Google ScholarGoogle Scholar
  44. H. Blinn. 1998. Ten more unsolved problems in computer graphics. IEEE Comput. Graph. Applic., 18(5): 86–89. DOI: 10.1109/38.708564.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. B. Bloombecker. 1987. Computer ethics: An antidote to despair. Comput. Soc., 16(4): 3–11. DOI: 10.1145/25601.25602.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. B. (J.) Bloombecker. 1983. Conscience in computing: A Law Day perspective on computer crime. Comput. Soc., 13(3): 9–13. DOI: 10.1145/958600.958603.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. B. (J.) Bloombecker. 1990. Needed: Binary Bar Mitzvah's and computer confirmations. Comput. Soc., 20(4): 20–21. DOI: 10.1145/122403.122408.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. A. Bochannek. 2011. What did the Americans know? A review of select periodicals. In A. N. Tomilin, editor. 2011. SoRuCom–2011 Proceeding, Second International Conference on the History of Computers and Informatics in the Soviet Union and Russian Federation, Veliky Novgorod, pp. 3–7.Google ScholarGoogle Scholar
  49. J. D. Bolter. 2001. Writing Space: Computers, Hypertext, and the Remediation of Print. Lawrence Erlbaum Associates, Mahwah, NJ.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. J. D. Bolter and M. Joyce. 1987. Hypertext and creative writing. In Proceedings of the ACM Conference on Hypertext–HYPERTEXT '87, pp. 41–50. ACM Press, New York. DOI: 10.1145/317426.317431.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. G. Bowker. 1993. How to be universal: Some cybernetic strategies, 1943–70. Soc. Stud. Sci., 23(1): 107–127.Google ScholarGoogle ScholarCross RefCross Ref
  52. C. P. Brown. 1972. An investigation into the recruitment and training of the disadvantaged for staffing the MIS function. Comput. Personn. Quart. Public. Spec. Inter. Group Comput. Personn. Res., 3(2): 3–8. DOI: 10.1145/1036396.1036397.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. J. J. Brown. 1967. Ideas in Exile: A History of Canadian Invention. McClelland and Stewart Ltd., Toronto.Google ScholarGoogle Scholar
  54. J. Brown and S. Cunningham. 2007. A history of ACM SIGGRAPH. Commun. ACM, 50(5): 54–61. DOI: 10.1145/1230819.1230839.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. P. Brown, C. Gere, N. Lambert, and C. Mason. 2009. White Heat Cold Logic: Early British Computer Art 1960–1980. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  56. K. B. Bruce, R. D. Cupper, and R. L. S. Drysdale. 2010. A history of the liberal arts computer science consortium and its model curricula. ACM Trans. Comput. Educ., 10(1): 3:1–3:12. DOI: 10.1145/1731041.1731044.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. C. Burck, editor. July 1968. Employing the unemployable. Fortune, 78(1): 29–30, 34.Google ScholarGoogle Scholar
  58. J. H. Burrows, Chairman. May 14–16, 1969. A panel session: Computers and the underprivileged. AFIPS '69 (Spring) Proceedings of the May 14–16, 1969, Spring Joint Computer Conference, pp. 35–40. ACM, New York.Google ScholarGoogle Scholar
  59. V. Bush. July 1945. As we may think. The Atlantic, pp. 101–108. Available at http://www.theatlantic.com/magazine/archive/1945/07/as-we-may-think/303881/Google ScholarGoogle Scholar
  60. T. Camp. 1997. The incredible shrinking pipeline. Commun. ACM, 40(10): 103–110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. T. Camp. Response. 1998. Commun. ACM, 41(3): 27–28.Google ScholarGoogle Scholar
  62. S. M. Campbell. 2009. Backwater calculations for the St. Lawrence Seaway and the first computer in Canada. Canadian Journal of Civil Engineering, 36(7): 1164–1169.Google ScholarGoogle ScholarCross RefCross Ref
  63. S. M. Campbell. 2003. Beatrice Helen Worsley: Canada's female computer pioneer. IEEE Ann. Hist. Comput., 25(3): 51–62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. S. M. Campbell. 2006. The premise of computer science: Establishing modern computing at the University of Toronto (1945–1964). Ph.D. thesis, Institute for the History and Philosophy of Science and Technology, University of Toronto.Google ScholarGoogle Scholar
  65. M. Campbell-Kelly and W. Aspray. 1996. Computer: A History of the Information Machine. Basic Books, New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. M. Campbell-Kelly. 1985. Christopher Strachey, 1916–1975: A biographical note. Ann. Hist. Comput., 7(1): 19–42. DOI: 10.1109/MAHC.1985.10001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. R. P. Canavan. 1986. ACM Forum: Reported hacking. Commun. ACM, 29(7): 590.Google ScholarGoogle Scholar
  68. L. Candela, D. Castelli, and P. Pagano. 2011. History, evolution, and impact of digital libraries. In I. Iglezakis, T. Synodinou, and S. Kapidakis, editors. E-Publishing and Digital Libraries: Legal and Organizational Issues, pp. 1–30. Information Science Reference, Hershey, PA. DOI: 10.4018/978--1-60960--031-0.ch001.Google ScholarGoogle Scholar
  69. R. J. Carnota. 2015. The beginning of computer science in Argentina and the Calculus Institute, 1957–1970. IEEE Ann. Hist. Comput., 37(4): 40–52.Google ScholarGoogle ScholarCross RefCross Ref
  70. S. J. Ceci and W. M. Williams, editors. 2007. Why Aren't More Women in Science? American Psychological Association, Washington, DC.Google ScholarGoogle Scholar
  71. P. E. Ceruzzi. 1998. A History of Modern Computing. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  72. M. Charland. 1986. Technological nationalism. Canadian Journal of Political and Social Theory, 10(1): 196–220.Google ScholarGoogle Scholar
  73. D. Clark and D. Wilson. 1987. A comparison of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 184–194. Oakland, CA. DOI: 10.1109/SP.1987.10001.Google ScholarGoogle Scholar
  74. A. Cochran. 1987. ACM: The past 15 years, 1972–1987. Commun. ACM, 30(10): 866–872. DOI: 10.1145/30408.30419.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. J. M. Cohoon and W. Aspray, editors. 2006. Women and Information Technology: Research on Underrepresentation. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  76. J. M. Cohoon and W. Aspray. 2006. A critical review of the research on women's participation in postsecondary computing education. In J. McGrath Cohoon and William Aspray, editors. 2006. Women and Information Technology: Research on Underrepresentation, pp. 137–180. MIT Press, Cambridge, MA. DOI: 10.7551/mitpress/9780262033459.003.0005.Google ScholarGoogle Scholar
  77. J. M. Cohoon. 1999. Departmental differences can point the way to improving female retention in computer science. In SIGCSE '99 The Proceedings of the Thirtieth SIGCSE Technical Symposium on Computer Science Education, pp. 198–202. ACM, New York. DOI: 10.1145/299649.299753.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. D. E. Comer, D. Gries, M. C. Mulder, A. Tucker, A. J. Turner, and P. R. Young. 1989. Computing as a discipline. Commun. ACM, 32(1): 9–23. DOI: 10.1145/63238.63239.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. J. Conklin. 1987. Hypertext: An introduction and survey. IEEE Comput., 20(9): 17–41. DOI: 10.1109/MC.1987.1663693.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. S. D. N. Cook and J. S. Brown. 1999. Bridging epistemologies: The generative dance between organizational knowledge and organizational knowing. Org. Sci., 10(4): 381–400. DOI: 10.1287/orsc.10.4.381.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. C. Corbett and C. Hill. 2015. Solving the Equation: The Variables for Women's Success in Engineering and Computing. AAUW, Washington DC.Google ScholarGoogle Scholar
  82. J. W. Cortada. 2012. The Digital Flood: The Diffusion of Information Technology across the U.S., Europe, and Asia. Oxford University Press, New York.Google ScholarGoogle Scholar
  83. D. Crawford. 1989. From Washington: Two bills equal forewarning. Commun. ACM, 32(7): 780–782.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. H. Crowther-Heyck. 2005. Herbert A. Simon: The Bounds of Reason in Modern America. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  85. W. E. Cundiff and M. Reid, editors. 1979. Issues in Canadian/US Transborder Computer Data Flows. Toronto: Institute for Research on Public Policy. DOI: 10.1145/959310.959312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. G. Davida, D. L. Wells, and J. B. Kam. 1981. A database encryption system with subkeys. Trans. Database Syst., 6(2): 312–328. DOI: 10.1145/319566.319580.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. C.-S. Davis, A. B. Ginorio, C. S. Hollenshead, B. B. Lazarus, and P. M. Rayman. 1996. The Equity Equation: Fostering the Advancement of Women in the Sciences, Mathematics, and Engineering. Jossey-Bass Publishers, San Francisco.Google ScholarGoogle Scholar
  88. P. Davis. January 8, 1998. Remembering George Forsythe. SIAM News. Available at http://www.siam.org/news/news.php?id=805.Google ScholarGoogle Scholar
  89. W. A. DeLegall. 1969. Teaching techniques and quality education/training for the 'Disadvantaged'. SIGCPR '69 Proceedings of the Seventh Annual Conference on SIGCPR, pp. 91–94. ACM, New York. DOI: 10.1145/800163.805184.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. L. DeNardis. 2015. The Internet design tension between surveillance and security. IEEE Ann. Hist. Comput., 37(2): 72–83. DOI: 10.1109/MAHC.2015.29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. D. E. Denning. 1976. A lattice model of secure information flow. Commun. ACM, 19(5): 236–243.Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. D. E. Denning. 1980. Secure statistical databases with random sample queries. Trans. Database Syst., 5(3): 291–315. DOI: 10.1145/320613.320616.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. D. E. Denning. 1991. The United States vs. Craig Neidorf: A debate on electronic publishing, Constitutional rights, and hacking. Commun. ACM, 34(3): 22–43. DOI: 10.1145/102868.102869.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. D. E. Denning and P. J. Denning. 1979. The tracker: A threat to statistical database security. Trans. Database Syst., 4(1): 76–96. DOI: 10.1145/320064.320069.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. P. J. Denning. 1977. Discrimination and affirmative action. Commun. ACM, 20(3): 198.Google ScholarGoogle Scholar
  96. P. J. Denning. 1988. Edmund C. Berkeley—ACM founder. Commun. ACM, 31(6): 781–782. DOI: 10.1145/62959.214901.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. P. J. Denning. 1990. Editorial: Sending a signal. Commun. ACM, 33(8): 11–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. P. J. Denning and C. H. Martell. 2015. Great Principles of Computing. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  99. P. J. Denning and H. S. Stone. 1980. An exchange of views on operating systems courses. Operat. Syst. Rev., 14(4): 71–82. DOI: 10.1145/850708.850714.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. P. J. Denning, D. H. Brandin, D. C. Schwartz, and G. I. Davida. 1981. Report of the public cryptography study group. Commun. ACM, 24(7): 434–450. DOI: 10.1145/358699.358707.Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. J. B. Dennis. 1967. A position paper on computing and communications. In SOSP '67 Proceedings of the First ACM Symposium on Operating System Principles, 6.1–6.10. DOI: 10.1145/363095.363147.Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. L.-B. Desroches, et al. December 1, 2014. Computer usage and national energy consumption: Results from a field-metering study, Lawrence Berkeley National Laboratory, December 1. Available at http://eetd.lbl.gov/sites/all/files/computers\_lbnl\_report\_v4.pdf.Google ScholarGoogle Scholar
  103. W. Diffie and M. E. Hellman. 1981. On the security of multiple encryption. Commun. ACM, 24(7): 465–467.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. W. Diffie and M. Hellman. June 7–10, 1976. Multiuser cryptographic techniques. In AFIPS '76 Proceedings of the June 7–10, 1976, National Computer Conference, pp. 109–112. DOI: 10.1145/1499799.1499815.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. T. A. DiPrete and C. Buchmann. 2013. The Rise of Women: The Growing Gender Gap in Education and What it Means for American Schools. Russell Sage Foundation, New York.Google ScholarGoogle Scholar
  106. S. Donig. 2010. Appropriating American technology in the 1960s: Cold War politics and the GDR computer industry. IEEE Ann. Hist. Comput., 32(2): 32–45.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. H. Durnova. 2014. Embracing the Algol effort in Czechoslovakia. IEEE Ann. Hist. Comput., 36(4): 26–37. DOI: 10.1109/MAHC.2014.51.Google ScholarGoogle ScholarCross RefCross Ref
  108. S. Dziallas and S. Fincher. 2015. ACM Curriculum Reports: A pedagogic perspective. In Proceedings of the Eleventh Annual International Conference on International Computing Education Research, pp. 81–89. ACM, New York. DOI: 10.1145/2787622.2787714.Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. P. N. Edwards. 1996. The Closed World: Computers and the Politics of Discourse in Cold War America. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  110. G. Engel, J. Impagliazzo, and P. LaMalva. 2009. A brief history of the Computing Sciences Accreditation Board (CSAB): Promoting quality education in the computing fields. In 2009 IEEE Conference on the History of Technical Societies, pp. 1–8. DOI: 10.1109/HTS.2009.5337839.Google ScholarGoogle Scholar
  111. D. C. Engelbart. 1986. The augmented knowledge workshop. In Proceedings of the ACM Conference on the History of Personal Workstations, pp. 73–83. ACM Press, New York. DOI: 10.1145/12178.12184.Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. D. C. Engelbart. 1995. Toward augmenting the human intellect and boosting our collective IQ. Commun. ACM, 38(8): 30–32. DOI: 10.1145/208344.208352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. N. L. Ensmenger. 2001. The 'Question of Professionalism' in the computer fields. IEEE Ann. Hist. Comput., 23(4): 1–19. DOI: 10.1109/85.969964.Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. N. L. Ensmenger. 2012. The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  115. N. L. Ensmenger. 2015. 'Beards, sandals, and other signs of rugged individualism': Masculine culture within the computing professions. Osiris, 30(1): 38–65. DOI: 10.1086/682955.Google ScholarGoogle ScholarCross RefCross Ref
  116. A. P. Ershov. 1963. Input Language for Automatic Programming Systems. Academic Press, New York.Google ScholarGoogle Scholar
  117. A. P. Ershov. 1960. Predislovie redaktora perevoda. In P. Naur, editor. Soobshchenie ob algoritmicheskom iazyke ALGOL 60, Moscow/Novosibirsk: Vychislitel'nyi Tsentr AN SSSR, pp. 3–9.Google ScholarGoogle Scholar
  118. A. P. Ershov. 1965. The Alpha—An automatic programming system of high efficiency. In Proceedings of IFIP Congress 65, volume 2, pp. 622–623. Macmillan and Co., London. DOI: 10.1145/321312.321314.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. A. P. Ershov. 1959. Programming Programme for the BESM Computer. Pergamon Press, London.Google ScholarGoogle Scholar
  120. A. P. Ershov and A. A. Liapunov. 1967. O formalizatsii poniatiia programmy. Kibernetika, (5): 40–57.Google ScholarGoogle Scholar
  121. A. P. Ershov, S. S. Lavrov, and M. R. Shura-Bura. 1965. In P. Naur, editor. Algoritmicheskii iazyk ALGOL 60: Peresmotrennoe soobshchenie. Mir, Moscow.Google ScholarGoogle Scholar
  122. N. Erskine. December 1970. A submission by the Canadian Information Processing Society related to the subject of participation by telecommunication carriers in public data processing. CIPS Mag., 1(11): 10–13.Google ScholarGoogle Scholar
  123. U. Feest and F. Steinle, editors. 2012. Scientific Concepts and Investigative Practice. Walter de Gruyter, Berlin.Google ScholarGoogle Scholar
  124. E. A. Feigenbaum. May 1965. From Minsk to Pinsk without Intourist. Datamation, 11(5): 34–36.Google ScholarGoogle Scholar
  125. E. A. Feigenbaum. 1961. Soviet cybernetics and computer sciences, 1960. Commun. ACM, 4(12): 566–579. DOI: 10.1145/366853.366891.Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. L. Fein. 1963. Computer-oriented peace research. AFIPS '63 (Fall) Proceedings of the November 12–14, 1963, 631–639. DOI: 10.1145/1463822.1463890.Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. L. Fein. June 1961. The computer-related sciences (Synnoetics) at a university in the year 1975, Am. Sci., 49(2): 149–168. DOI: 10.1145/364005.364020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. L. Fein. 1959. The role of the university in computers, data processing, and related fields. Commun. ACM, 2(9): 7–14. DOI: 10.1145/1457838.1457859.Google ScholarGoogle ScholarDigital LibraryDigital Library
  129. W. Fetter. 1982. A progression of human figures simulated by computer graphics. IEEE Comput. Graph. Applic., 2(9): 9–13. DOI: 10.1109/MCG.1982.1674468.Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. J. Foley. 2000. Getting there: The ten top problems left. IEEE Comput. Graph. Applic., 20(1): 66–68. DOI: 10.1109/38.814569.Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. K. A. Forcht. 1986. The need for including data security topics in the college business curriculum. SIGSAC Rev., 4(3): 9–11. DOI: 10.1145/1058414.1058416.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. D. E. Forsythe. 2001. George and Sandra's daughter, Robert's girl: Doing ethnographic research in my parents' field. In D. J. Hess, editor. Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence, pp. 183–196. Stanford University Press, Stanford.Google ScholarGoogle Scholar
  133. D. E. Forsythe. 2001. Disappearing women in the social world of computing. In D. J. Hess, editor. Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence, pp. 163–182. Stanford University Press, Stanford.Google ScholarGoogle Scholar
  134. G. E. Forsythe. June 25, 1965. Stanford University's program in computer science. Technical Report CS26. Computer Science Department, Stanford University. Available at http://i.stanford.edu/pub/cstr/reports/cs/tr/65/26/CS-TR-65--26.pdfGoogle ScholarGoogle Scholar
  135. G. E. Forsythe. 1967. A university's educational program in computer science. Commun. ACM, 10(1): 3–11. DOI: 10.1145/363018.363038.Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. G. E. Forsythe. 1965. Official ACM. Commun. ACM, 8(7): 422–426.Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. G. E. Forsythe. 1968. What to do till the computer scientist comes? Am. Math. Month., 75(5): 454–462. DOI: 10.2307/2314698.Google ScholarGoogle ScholarCross RefCross Ref
  138. G. Forsythe and W. Wasow. 1960. Finite-Difference Methods for Partial Differential Equations. Wiley, New York.Google ScholarGoogle Scholar
  139. G. Forsythe. 1965. President's letter to the ACM membership: Why ACM? Commun. ACM, 8(3): 143–144. DOI: 10.1145/364995.364997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. E. A. Fox, R. M. Akscyn, R. K. Furuta, and J.J. Leggett. 1995. Digital libraries. Commun. ACM, 38(4): 22–28. DOI: 10.1145/205323.205325.Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. R. D. Francis. 2010. The Technological Imperative in Canada. UBC Press, Vancouver.Google ScholarGoogle Scholar
  142. K. Frenkel. 1990. Women and computing. Commun. ACM, 33(11): 34–46.Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. J. Gaboury. 2015. Hidden surface problems: On the digital image as material object. J. Vis. Cult., 14(1): 40–60. DOI: 10.1177/1470412914562270.Google ScholarGoogle ScholarCross RefCross Ref
  144. R. S. Gaines. 1975. Session 3: Protection. Operating Systems Review, 9(3): 58. DOI: 10.1145/800272.810900.Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. R. S. Gaines and D. K. Hsiao. 1975. Preface. In Proceedings of the 1st International Conference on Very Large Data Bases.Google ScholarGoogle Scholar
  146. C. Gallagher. 1970. The computer as Rosemary's baby. Comput. Soc., 1(2): 4.Google ScholarGoogle Scholar
  147. C. Galvan. 2012. What can we learn from computer engineer Barbie? ACM-W CIS Newsletter, 4(1): 21–32.Google ScholarGoogle Scholar
  148. K. Garvin-Doxas and L. J. Barker. 2004. Communication in computer science classrooms: Understanding defensive climates as a means of creating supportive behaviors. ACM J. Educ. Resour. Comput., 4(1): 1–18. DOI: 10.1145/1060071.1060073.Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. S. Gerovitch. 2001. From Newspeak to Cyberspeak: A History of Soviet Cybernetics. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  150. E. M. Gerson. 1977. Directory of researchers in computers and society. Comput. Soc., 8(4): 5–9. DOI: 10.1145/958901.958903.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. N. E. Gibbs and A. B. Tucker. 1986. A model curriculum for a liberal arts degree in computer science. Commun. ACM, 29(3): 202–210. DOI: 10.1145/5666.5667.Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. T. F. Gieryn. 1999. Cultural Boundaries of Science: Credibility on the Line. University of Chicago Press, Chicago.Google ScholarGoogle Scholar
  153. J. P. Gilbert and D. B. Mayer. 1969. Experiences in self-selection of disadvantaged people into a computer operator training program. SIGCPR '69 Proceedings of the Seventh Annual Conference on SIGCPR, pp. 79–90. ACM, New York. DOI: 10.1145/800163.805183.Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. C. S. Gillmor. 2004. Fred Terman at Stanford: Building a Discipline, a University, and Silicon Valley. Stanford University Press, Stanford.Google ScholarGoogle Scholar
  155. C. Ginzburg. 1980. The Cheese and the Worms: The Cosmos of a Sixteenth-Century Miller. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  156. E. F. Glynn. 1998. More studies needed. Commun. ACM, 41(3): 27.Google ScholarGoogle Scholar
  157. A. Goldberg. 1985. Reliability of computer systems and risks to the public. Commun. ACM, 28(2): 131–133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. M. L. Goldberger, B. A. Maher, and P. E. Flattau, editors. 1995. Research Doctorate Programs in the United States: Continuity and Change. National Academy Press, Washington, DC.Google ScholarGoogle Scholar
  159. G. A. Good. 2000. The assembly of geophysics: Scientific disciplines as frameworks of consensus. Stud. Hist. Philoso. Sci. (Part B), 31(3): 259–292. DOI: 10.1016/S1355-2198(00)00018-6.Google ScholarGoogle ScholarCross RefCross Ref
  160. S. Gorn. 1963. The computer and information sciences: A new basic discipline. SIAM Rev., 5(2): 150–155. DOI: 10.1137/1005036.Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. C. M. Gorriz and C. Medina. 2000. Engaging girls with computers through software games. Commun. ACM, 43(1): 42–49. DOI: 10.1145/323830.323843.Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. R. Graham. 1967. Protection in an information utility. In SOSP '67: Proceedings of the First ACM Symposium on Operating System Principles. DOI: 10.1145/800001.811674.Google ScholarGoogle ScholarDigital LibraryDigital Library
  163. V. Green. 2001. Race on the Line: Gender, Labor, and Technology in the Bell System, 1880–1980. Duke University Press, Durham, NC.Google ScholarGoogle Scholar
  164. R. Greenwood, C. R. Hinings, and R. Suddaby. 2002. Theorizing change: The role of professional associations in the transformation of institutionalized fields. Acad. Manage. J., 45(1): 58–80. DOI: 10.2307/3069285.Google ScholarGoogle Scholar
  165. D. A. Grier. 2005. When Computers were Human. Princeton University Press, Princeton.Google ScholarGoogle Scholar
  166. H. Griffin and P. Gravelle. 1969. Report on the philosophy and mechanics of the urban education committee of Philadelphia. SIGCPR '69 Proceedings of the Seventh Annual Conference on SIGCPR, pp. 95–98. ACM, New York. DOI: 10.1145/800163.805185.Google ScholarGoogle ScholarDigital LibraryDigital Library
  167. K. Grønbæ k and R. H. Trigg. 1999. From Web to Workplace: Designing Open Hypermedia Systems. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  168. G. K. Gupta. 2007. Computer science curriculum developments in the 1960s. IEEE Ann. Hist. Comput., 29(2): 40–54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  169. I. Hacking. 1999. The Social Construction of What? Harvard University Press, Cambridge, MA.Google ScholarGoogle Scholar
  170. T. Haigh. 2001. The chromium-plated tabulator: Institutionalizing an electronic revolution, 1954–1958. IEEE Ann. Hist. Comput., 23(4): 75–104. DOI: 10.1109/85.969965.Google ScholarGoogle ScholarDigital LibraryDigital Library
  171. T. Haigh. 2002. Technology, information and power: Managerial technicians in corporate America, 1917–2000. Ph.D. Dissertation, University of Pennsylvania.Google ScholarGoogle Scholar
  172. T. Haigh. 2008. Cleve Moler: Mathematical software pioneer and creator of Matlab. IEEE Ann. Hist. Comput., 30(1): 87–91. DOI: 10.1109/MAHC.2008.2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. T. Haigh. 2010. Masculinity and the masculine man. In T. J. Misa, editor. Gender Codes: Why Women Are Leaving Computing, pp. 51–71. Wiley IEEE Computer Society, Hoboken, NJ.Google ScholarGoogle Scholar
  174. T. Haigh, E. Kaplan, and C. Seib. 2007. Sources for ACM history. Commun. ACM, 50(5): 36–41. DOI: 10.1145/1230819.1230836.Google ScholarGoogle ScholarDigital LibraryDigital Library
  175. T. Haigh, M. Priestley, and C. Rope. 2016. ENIAC in Action: Making and Remaking the Modern Computer. MIT Press, Cambridge, MA.Google ScholarGoogle ScholarCross RefCross Ref
  176. F. G. Halasz. 1987. Reflections on NoteCards: Seven issues for the next generation of hypermedia systems. In Proceeding of the ACM Conference on Hypertext–HYPERTEXT '87, pp. 345–365. ACM Press, New York. DOI: 10.1145/317426.317451.Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. F. G. Halasz and M. Schwartz. 1994. The Dexter hypertext reference model. Commun. ACM, 37(2): 30–39. DOI: 10.1145/175235.175237Google ScholarGoogle ScholarDigital LibraryDigital Library
  178. M. Hall. 2012. Understanding ACM's past. Commun. ACM, 55(12): 5. DOI: 10.1145/2380656.2380657.Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. W. Hall. 2007. Back to the future with Hypertext: A tale of two or three conferences. In Proceedings of the Eighteenth Conference on Hypertext and Hypermedia, (HT '07), pp. 179–180. ACM, New York. DOI: 10.1145/1286240.1286293.Google ScholarGoogle ScholarDigital LibraryDigital Library
  180. D. Haltrect. 1970. Computer show/competition. CIPS Mag., 1(7): 10.Google ScholarGoogle Scholar
  181. R. Hammerman and A. L. Russell, editors. 2015. Ada's Legacy: Cultures of Computing from the Victorian to the Digital Age. Association for Computing Machinery and Morgan & Claypool, New York. DOI: 10.1145/2809523.Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. V. Hanson, R. Ayfer, and B. Bachmayer. 2014. European women in computing. Commun. ACM, 57(7): 5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. T. R. Harbron. 1984. More on accreditation. Commun. ACM, 27(10): 988. DOI: 10.1145/358274.358276.Google ScholarGoogle ScholarDigital LibraryDigital Library
  184. J. Hartmanis. 1992. Computing the future. Commun. ACM, 35(11): 31–40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  185. J. Hartmanis. 1994. On computational complexity and the nature of computer science. Commun. ACM, 37(10): 37–43. DOI: 10.1145/214037.214040.Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. J. Hartmanis and H. Lin, editors. 1992. Computing the Future: A Broader Agenda for Computer Science and Engineering. National Academy Press, Washington, DC.Google ScholarGoogle Scholar
  187. C. C. Hayes. 2010. Computer science: The incredible shrinking woman. In T. J. Misa, editor. Gender Codes: Why Women are Leaving Computing, pp. 25–49. Wiley IEEE Computer Society, New York. DOI: 10.1002/9780470619926.ch2.Google ScholarGoogle Scholar
  188. R. V. Head. 2004. Datamation's glory days. IEEE Ann. Hist. Comput., 26(2): 16–21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  189. P. Heckbert. April 1987. Ten unsolved problems in rendering. In Workshop on Rendering Algorithms and Systems, Graphics Interface 87, Toronto.Google ScholarGoogle Scholar
  190. E. B. Heinlein. 1989. ACM Forum: Beyond worms. Commun. ACM, 32(6): 674.Google ScholarGoogle Scholar
  191. V. Henriques. 1970. Computing and the disadvantaged, a panel session. ACM '70: Proceedings of the 1970 25th Annual Conference on Computers and Crisis: How Computers Are Shaping Our Future, pp. 8–15. ACM, New York. DOI: 10.1145/1147347.1147286.Google ScholarGoogle ScholarDigital LibraryDigital Library
  192. M. J. Heron, P. Belford, and A. Goker. 2014. Sexism in the circuitry: Female participation in male-dominated popular computer culture. ACM SIGCAS Comput. Soc., 44(4): 18–29. DOI: 10.1145/2695577.2695582.Google ScholarGoogle ScholarDigital LibraryDigital Library
  193. R. Hersch. 1992. In memoriam: Nicholas D. Kazarinoff. SIAM Rev., 34(1): 127. DOI: 10.1137/1034017.Google ScholarGoogle ScholarCross RefCross Ref
  194. M. Hicks. 2010. Only the clothes changed: Women operators in British computing and advertising, 1950–1970. IEEE Ann. Hist. Comput., 32(2): 2–14. DOI: 10.1109/MAHC.2010.55.Google ScholarGoogle ScholarDigital LibraryDigital Library
  195. H. Higgins and D. Kahn, editors. 2012. Mainframe Experimentalism: Early Computing and the Foundations of the Digital Arts. University of California Press, Berkeley.Google ScholarGoogle ScholarCross RefCross Ref
  196. C. Hill, C. Corbett, and A. St. Rose. 2010. Why So Few?: Women in Science, Technology, Engineering, and Mathematics. AAUW, Washington DC.Google ScholarGoogle Scholar
  197. M. A. Hiltzik. 1999. Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age. Harper Business.Google ScholarGoogle Scholar
  198. L. H. Hin, A. L. Wilkinson, D. H. Anderson, D. P. Chang, W. Wright, A. J. Mayo, I. T. Viney, and R. Williams. 1981. A penetration analysis of a Burroughs large system. Operat. Syst. Rev., 15(1): 14–25. DOI: 10.1145/1041454.1041455.Google ScholarGoogle ScholarDigital LibraryDigital Library
  199. D. C. Hoefler. January 11, 1971. Silicon Valley in the USA. Electronic News.Google ScholarGoogle Scholar
  200. C. Hollenshead, S. Wenzel, B. Lazarus, and I. Nair. 1996. The graduate experiences in the sciences and engineering: Rethinking a gendered institution. In C.-S. Davis, et al., editors. The Equity Equation: Fostering the Advancement of Women in the Sciences, Mathematics, and Engineering, pp. 122–163. Jossey-Bass Publishers, San Francisco.Google ScholarGoogle Scholar
  201. D. K. Hsiao. 1980. TODS: The first three years (1976–1978). Trans. Database Syst., 5(4): 385–403. DOI: 10.1145/320610.320611.Google ScholarGoogle ScholarDigital LibraryDigital Library
  202. J. Hurst, M. S. Mahoney, N. H. Taylor, D. T. Ross, and R. M. Fano. July–August, 1989. Retrospectives I: The early years in computer graphics at MIT, Lincoln Lab and Harvard, and Retrospectives II: The early years in computer graphics at MIT, Lincoln Lab and Harvard. SIGGRAPH '89 Panel Proceedings, July 31–Aug. 4, 1989, pp. 19–73. Association for Computing Machinery, Boston/New York. DOI: 10.1145/77277.77279.Google ScholarGoogle ScholarDigital LibraryDigital Library
  203. E. T. James, editor. 1971. s.v., “Nora Stanton Blatch Barney.” Notable American Women: A Biographical Dictionary. Belknap Press of Harvard University Press, Cambridge, MA.Google ScholarGoogle Scholar
  204. R. F. Johnston. 1952. The University of Toronto electronic computer. ACM '52: Proceedings of the 1952 ACM National Meeting (Toronto), pp. 154–160. ACM Press, New York.Google ScholarGoogle ScholarCross RefCross Ref
  205. D. H. Jonassen. 1989. Hypertext/Hypermedia. Educational Technology Publications, Englewood Cliffs, NJ.Google ScholarGoogle Scholar
  206. A. Kay. 1969. The reactive engine. University of Utah Dissertation.Google ScholarGoogle Scholar
  207. E. F. Keller. 1985. Reflections on Gender and Science. Yale University Press, New Haven, CT.Google ScholarGoogle Scholar
  208. S. Kim, M. Slater, and E. J. Whitehead, Jr. 2004. WebDAV-based hypertext annotation and Trail System. In Proceedings of the Fifteenth ACM Confereence on Hypertext and Hypermedia—Hypertext'04, pp. 87–88. ACM Press, New York. DOI: 10.1145/1012807.1012832.Google ScholarGoogle ScholarDigital LibraryDigital Library
  209. A. Kitzmann. 2006. Hypertext Handbook: The Straight Story. Peter Lang, New York.Google ScholarGoogle Scholar
  210. M. Klawe and N. Leveson. 1995. Women in computing: Where are we now? Commun. ACM, 38(1): 29–35. DOI: 10.1145/204865.204874.Google ScholarGoogle ScholarDigital LibraryDigital Library
  211. R. R. Kline. 2015. The Cybernetics Moment: Or Why We Call Our Age the Information Age. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  212. R. Kling. 1981. Computer abuse and computer crime as organizational activities. Comput. Soc., 11(4): 13. DOI: 10.1145/957869.957871.Google ScholarGoogle ScholarDigital LibraryDigital Library
  213. R. Kling. 1976. Social impacts of computing. Comput. Soc., 7(2).Google ScholarGoogle Scholar
  214. D. E. Knuth. 1972. George Forsythe and the development of computer science. Commun. ACM, 15(8): 721–727. DOI: 10.1145/361532.361538.Google ScholarGoogle ScholarDigital LibraryDigital Library
  215. D. E. Knuth. 1974. Computer science and its relation to mathematics. Am. Math. Month., 81: 323–343. DOI: 10.2307/2318994.Google ScholarGoogle ScholarCross RefCross Ref
  216. N. Krementsov. 2005. International Science between the World Wars: The Case of Genetics. Routledge, New York.Google ScholarGoogle Scholar
  217. J. Krige. 2006. Atoms for Peace, scientific internationalism, and scientific intelligence. Osiris, 21:161–181. DOI: 10.1086/507140.Google ScholarGoogle ScholarCross RefCross Ref
  218. F. N. Krull. 1994. The origin of computer graphics within General Motors. IEEE Ann. Hist. Comput., 16(3): 40–56. DOI: 10.1109/MAHC.1994.298419.Google ScholarGoogle ScholarDigital LibraryDigital Library
  219. B. Lampson. 1973. A note on the confinement problem. Commun. ACM, 16(10): 613–15. DOI: 10.1145/362375.362389.Google ScholarGoogle ScholarDigital LibraryDigital Library
  220. B. Lampson. 1971. Protection. Operat. Syst. Rev., 8(1): 18. Reprinted from Butler Lampson, Protection. In Proceedings of Fifth Princeton Symposium on Information Sciences and Systems, pp. 437–443. Princeton.Google ScholarGoogle ScholarDigital LibraryDigital Library
  221. B. Lampson, et al. 1977. Protection, security, reliability. Operat. Syst. Rev., 11(1): 13.Google ScholarGoogle Scholar
  222. C. P. Landis. 1973. Computer records and people. Comput. Soc., 4(3): 15.Google ScholarGoogle Scholar
  223. G. P. Landow. 2006. Hypertext 3.0: Critical Theory and New Media in an Era of Globalization. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  224. B. F. Laposky. 1969. Oscillons: Electronic abstractions. Leonardo, 2(4): 345–354. DOI: 10.2307/1572117.Google ScholarGoogle ScholarCross RefCross Ref
  225. R. D. Launius. 1999. NASA history and the challenge of keeping the contemporary past. Publ. Hist., 21(3): 63–81. DOI: 10.2307/3378961.Google ScholarGoogle ScholarCross RefCross Ref
  226. J. A. N. Lee, G. Segal, and R. Steier. 1986. Positive alternatives: A report on an ACM panel on hacking. Commun. ACM, 29(4): 297–299. DOI: 10.1145/5684.6377.Google ScholarGoogle ScholarDigital LibraryDigital Library
  227. A. Leonard. June 10, 1999. Can history survive Silicon Valley? Salon. http://www.salon.com/1999/06/10/stanford/.Google ScholarGoogle Scholar
  228. S. Levy. 2001. Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age. Penguin Books, New York.Google ScholarGoogle Scholar
  229. N. Lewis. 2016. Peering through the curtain: Soviet computing through the eyes of western experts. IEEE Ann. Hist. Comput., 38(1): 34–47. DOI: 10.1109/MAHC.2015.48Google ScholarGoogle ScholarDigital LibraryDigital Library
  230. A. A. Liapunov. 1958. O logicheskikh skhemakh programm. Problemy Kibernetiki, 1: 46–74. Fizmatgiz, Moscow.Google ScholarGoogle Scholar
  231. J. C. R. Licklider. 1960. Man-computer symbiosis. IRE Trans. Hum. Fact. Electron., 1:4–11. DOI: 10.1109/THFE2.1960.4503259.Google ScholarGoogle ScholarCross RefCross Ref
  232. J. Light. 1999. When computers were women. Technol. Cult., 40(3): 455–483. Available at http://www.jstor.org/stable/25147356.Google ScholarGoogle ScholarCross RefCross Ref
  233. S. B. Lipner. 1975. A comment on the confinement problem. SOSP '75 Symposium on Operating System Principles, pp. 192–196. DOI: 10.1145/1067629.806537.Google ScholarGoogle ScholarDigital LibraryDigital Library
  234. S. B. Lipner. 2015. The birth and death of the Orange Book. IEEE Ann. Hist. Comput., 37(2): 19–31. DOI: 10.1109/MAHC.2015.27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  235. J. S. Long and M. F. Fox. 1995. Scientific careers: Universalism and particularism. Ann. Rev. Sociol., 21:45–71.Google ScholarGoogle ScholarCross RefCross Ref
  236. B. Longo. 2007. ACM established to develop communication about computing. Commun. ACM, 50(5): 27–29. DOI: 10.1145/1230819.1230834.Google ScholarGoogle ScholarDigital LibraryDigital Library
  237. B. Longo. 2015. Edmund Berkeley and the Social Responsibility of Computer Professionals. Association for Computing Machinery and Morgan & Claypool, New York. DOI: 10.1145/2787754.Google ScholarGoogle ScholarDigital LibraryDigital Library
  238. Iu. M. Lotman and B. A. Uspenskii. 1987. Pis'ma russkogo puteshestvennika Karamzina i ikh mesto v razvitii russkoi kul'tury. Introductory note to Pis'ma russkogo puteshestvennika by N. M. Karamzin, pp. 525–606. Nauka, Leningrad.Google ScholarGoogle Scholar
  239. R. S. Lowen. 1997. Creating the Cold War University: The Transformation of Stanford. University of California Press, Berkeley.Google ScholarGoogle Scholar
  240. J. Lucena. 2005. Defending the Nation: U.S. Policymaking to Create Scientists and Engineers from Sputnik to the 'War against Terrorism'. University Press of America, Lanham, MD.Google ScholarGoogle Scholar
  241. R. MacDougall. 2007. All red dream: Technological nationalism at the Trans-Canada Telephone System. In N. Hillmer and A. Chapnick, editors. Canadas of the Mind: The Making and Unmaking of Canadian Nationalisms in the Twentieth Century, pp. 47–62. McGill-Queen's University Press, Montreal & Kingston.Google ScholarGoogle Scholar
  242. D. MacKenzie. 2001. Mechanizing Proof: Computing, Risk, and Trust. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  243. M. S. Mahoney. 2001. Boys' toys and women's work: Feminism engages software. In A. N. H. Creager, E. Lunbeck, and L. Schiebinger, editors. Feminism in Twentieth Century Science, Technology and Medicine, pp. 169–185. University of Chicago Press, Chicago.Google ScholarGoogle Scholar
  244. M. Mahoney. 1997. Computer science: The search for a mathematical theory. In J. Krige and D. Pestre, editors. Science in the Twentieth Century, pp. 617–634. Harwood Academic Publishers, Amsterdam.Google ScholarGoogle Scholar
  245. M. Mahoney. 2002. Software: The self-programming machine. In A. Akera and F. Nebeker, editors. From 0 to 1: An Authoritative History of Modern Computing, pp. 91–100. Oxford University Press, New York.Google ScholarGoogle Scholar
  246. M. S. Mahoney. In T. Haigh, editor. 2011. Histories of Computing. Harvard University Press, Cambridge, MA.Google ScholarGoogle Scholar
  247. S. Marenco. 2013. Barbie I Can Be…a Computer Engineer. Random House, New York.Google ScholarGoogle Scholar
  248. J. Margolis and A. Fisher. 2002. Unlocking the Clubhouse: Women in Computing. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  249. C. J. Martincic and N. Bhatnagar. 2012. Will computer engineer Barbie impact young women's career choices? Inform. Syst. Educ. J., 10(6): 4–14.Google ScholarGoogle Scholar
  250. J. Matthews. 1989. ACM Forum: Worm turns. Commun. ACM, 32(9): 1044.Google ScholarGoogle ScholarDigital LibraryDigital Library
  251. D. B. Mayer. November 18–20, 1969. The involved generation: Computing people and the disadvantaged. AFIPS '69 (Fall) Proceedings of the November 18–20, 1969, Fall Joint Computer Conference, pp. 679–690. ACM, New York. DOI: 10.1145/1478559.1478642.Google ScholarGoogle ScholarDigital LibraryDigital Library
  252. D. R. McCamus. 1970. They worry too much. CIPS Mag., 1(2): 21.Google ScholarGoogle Scholar
  253. D. D. McCracken. 1974. A problem-list of issues concerning computers and public policy. Commun. ACM, 17(9): 496–503.Google ScholarGoogle Scholar
  254. D. McCullough. 1988. Noninterference and the composibility of security properties. IEEE Symposium on Security and Privacy, Computer Society Press of the IEEE, pp. 177–86.Google ScholarGoogle Scholar
  255. M. D. McIlroy. 1990. ACM Forum: Green light for bad software. Commun. ACM, 33(5): 479.Google ScholarGoogle ScholarDigital LibraryDigital Library
  256. J. S. McIlwee and J. G. Robinson. 1992. Women in Engineering: Gender, Power, and Workplace Culture. SUNY Press, Albany.Google ScholarGoogle Scholar
  257. A. M. McMahon. 1984. The Making of a Profession: A Century of Electrical Engineering in America. Institute of Electrical and Electronics Engineers, New York.Google ScholarGoogle Scholar
  258. R. Merkle. 1978. Secure communications over insecure channels. Commun. ACM, 21(4): 294–299. DOI: 10.1145/359460.359473.Google ScholarGoogle ScholarDigital LibraryDigital Library
  259. L. Mezei. 1965. The social responsibility of computer specialists. Computing and Data Processing Society of Canada Quarterly Bulletin, 5(3): 32–43, 51.Google ScholarGoogle Scholar
  260. L. Mezei. 1969. Social responsibility. Information Processing Society of Canada Quarterly Bulletin, 9(2): 5–6.Google ScholarGoogle Scholar
  261. J. Minker. 1981. Computer scientists whose scientific freedom and human rights have been violated: A report of the ACM committee on scientific freedom and human rights. Commun. ACM, 24(3): 134–139. DOI: 10.1145/358568.358584.Google ScholarGoogle ScholarDigital LibraryDigital Library
  262. T. J. Misa, editor. 2010. Gender Codes: Why Women are Leaving Computing. Wiley IEEE Computer Society, Hoboken, NJ.Google ScholarGoogle ScholarCross RefCross Ref
  263. T. J. Misa. 2010. Gender codes: Defining the problem. In T. J. Misa, editor. Gender Codes: Why Women Are Leaving Computing, pp. 3–23. Wiley-IEEE Computer Society, Hoboken, NJ.Google ScholarGoogle ScholarCross RefCross Ref
  264. T. J. Misa. 2012 & 2013. Charles Babbage Institute: Glimpses of the founding. CBI Newslett., 34(2) and 35(1). Available at http://www.cbi.umn.edu/about/nsl/v34n2.pdf\#page=4 and http://www.cbi.umn.edu/about/nsl/v35n1.pdf\#page=19.Google ScholarGoogle Scholar
  265. T. J. Misa. 2015. Computing is history. Commun. ACM, 58(10): 35–37. DOI: 10.1145/2814845.Google ScholarGoogle ScholarDigital LibraryDigital Library
  266. T. J. Misa. 2016. Charles Babbage, Ada Lovelace, and the Bernoulli numbers. In R. Hammerman and A. L. Russell, editors. Ada's Legacy. ACM and Morgan & Claypool, New York.Google ScholarGoogle Scholar
  267. R. Montanelli and S. Mamrak. 1976. The status of women and minorities in academic computer science. Commun. ACM, 19(10): 578–581. DOI: 10.1145/360349.360361.Google ScholarGoogle ScholarDigital LibraryDigital Library
  268. L. B. Moore. 1971. Unhindered. CIPS Mag., 2(9): 12–14.Google ScholarGoogle Scholar
  269. M. G. Morgan, M. R. Mirabito, and N. J. Down. 1970. Computer jobs through training: A preliminary project report. AFIPS '70 (Fall): Proceedings of the November 17-19, 1970, Fall Joint Computer Conference, p. 346. ACM, New York.Google ScholarGoogle Scholar
  270. M. G. Morgan, N. J. Down, and R. W. Sadler. December 5–7, 1972. Computer jobs through training: A final project report. 1972 Fall Joint Computer Conference. AFIPS Conference Proceedings, Vol. 41, Part II, pp. 1243–1249. American Federation of Information Processing Societies, Inc., Montvale, NJ. DOI: 10.1145/1480083.148016.Google ScholarGoogle Scholar
  271. P. M. Morse. June 2–4, 1960. Report on a conference of university computing center directors. Commun. ACM, 3(10): 519–521. DOI: 10.1145/367415.993448.Google ScholarGoogle ScholarDigital LibraryDigital Library
  272. A. L. Morton, Jr. May 14–16, 1969. Computers and the underprivileged. AFIPS '69 (Spring) Proceedings of the May 14–16, 1969, Spring Joint Computer Conference, pp. 37–38. ACM, New York. DOI: 10.1145/1476793.1476806.Google ScholarGoogle ScholarDigital LibraryDigital Library
  273. P. Mounier-Kuhn. 2012. Computer science in French universities: Early entrants and latecomers. Inform. Cult. J. Hist., 47(4): 414–456.Google ScholarGoogle Scholar
  274. M. C. Mulder. 1975. Model curricula for four-year computer science and engineering programs: Bridging the tar pit. Computer, 8(12): 28–33. DOI: 10.1109/C-M.1975.218831.Google ScholarGoogle ScholarDigital LibraryDigital Library
  275. M. C. Mulder and J. Dalphin. 1984. Computer science program requirements and accreditation. Commun. ACM, 27(4): 330–335. DOI: 10.1145/358027.358036.Google ScholarGoogle ScholarDigital LibraryDigital Library
  276. W. Myers. 1986. Computing sciences accreditation pro and con. Computer, 19(6): 47–49. DOI: 10.1109/MC.1986.1663252.Google ScholarGoogle ScholarDigital LibraryDigital Library
  277. T. Narten and E. H. Spafford. 1989. ACM Forum: Beyond worms. Commun. ACM, 32(6): 673–674.Google ScholarGoogle Scholar
  278. R. A. Nelsen. 2017. Race and computing: The problem of sources, the potential of prosopography, and the lesson of Ebony magazine. IEEE Ann. Hist. Comput., (forthcoming 2017). DOI: 10.1109/MAHC.2016.11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  279. T. Nelson. 1974. Computer Lib/Dream Machines. Mindful Press, Sausalito, CA.Google ScholarGoogle Scholar
  280. T. H. Nelson. 1965. Complex information processing: A file structure for the complex, the changing and the indeterminate. In Proceedings of the 20th National Conference, pp. 84–100. ACM Press, New York. DOI: 10.1145/800197.806036.Google ScholarGoogle ScholarDigital LibraryDigital Library
  281. M. Nerland and B. Karseth. 2015. The knowledge work of professional associations: Approaches to standardisation and forms of legitimisation. J. Educ. Work, 28(1): 1–23. DOI: 10.1080/13639080.2013.802833.Google ScholarGoogle ScholarCross RefCross Ref
  282. J. J. Nersessian. 2010. Creating Scientific Concepts. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  283. B. Neugent. 1986. Preposterous opinions about computer security. SIGSAC Rev., 4(3): 1–8. DOI: 10.1145/1058414.1058415.Google ScholarGoogle ScholarDigital LibraryDigital Library
  284. P. G. Neumann. March 29, 1991. More on Computers, Freedom, and Privacy. Available at http://catless.ncl.ac.uk/Risks/11.35.html\#subj3.1Google ScholarGoogle Scholar
  285. P. G. Neumann, S. Peisert, and M. Schaefer. 2014. The IEEE Symposium on Security and Privacy, in retrospect. IEEE Secur. Priv., 12(3): 15–17.Google ScholarGoogle ScholarCross RefCross Ref
  286. A. Newell, A. J. Perlis, and H. A. Simon. 1967. Letters: Computer science. Science, 157(22): 1373–1374. http://www.jstor.org/stable/1723308.Google ScholarGoogle ScholarCross RefCross Ref
  287. M. Newell and J. Blinn. 1977. The progression of realism in computer generated images. ACM '77 Proceedings of the 1977 Annual Conference, pp. 444–448. ACM, New York.Google ScholarGoogle Scholar
  288. J. Nielsen. 1995. Multimedia and Hypertext: The Internet and Beyond. Morgan Kaufmann.Google ScholarGoogle Scholar
  289. I. Nikiforova. 2012. The paradox of excellence: Merit and occupational attainments of women in computer science. In Proceedings from GEXcel Theme 11–12: Gender Paradoxes in Changing Academic and Scientific Organisation(s), pp. 49–56. LiU-Tryck, Linköping University Press, Linköping.Google ScholarGoogle Scholar
  290. D. Nofre, M. Priestley, and G. Alberts. 2014. When technology became language: The origins of the linguistic conception of computer programming, 1950–1960. Technol. Cult., 55(1): 40–75. DOI: 10.1353/tech.2014.0031.Google ScholarGoogle ScholarCross RefCross Ref
  291. A. Norberg. 2003. Twenty-five years of the Charles Babbage Institute. CBI Newsletter 26(1). Available at http://www.cbi.umn.edu/about/nsl/v26n1graphics.pdf\#page=3.Google ScholarGoogle Scholar
  292. A. L. Norberg and J. E. O'Neill. 1996. Transforming Computer Technology: Information Processing for the Pentagon, 1962–1986. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  293. J. November. 2007. George Elmer Forsythe. In The New Dictionary of Scientific Biography. Charles Scribner's Sons, New York.Google ScholarGoogle Scholar
  294. J. November. 2012. Biomedical Computing: Digitizing Life in the United States. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  295. A. G. Oettinger. 1966. On ACM's responsibility. Commun. ACM, 9(4): 246. DOI: 10.1145/365278.365290.Google ScholarGoogle ScholarDigital LibraryDigital Library
  296. R. Oldenziel. 2003. Multiple-entry visas: Gender and engineering in the US, 1870–1945. In A. Canel, R. Oldenziel, and K. Zachmann, editors. Crossing Boundaries, Building Bridges: Comparing the History of Women Engineers, 1870s–1990s, pp. 11–49. Routledge, New York.Google ScholarGoogle Scholar
  297. J. D. Oldham. 2009. Examining computers and society 1970–2008. Comput. Soc., 39(2): 34–42. DOI: 10.1145/1621918.1621930.Google ScholarGoogle ScholarDigital LibraryDigital Library
  298. J. R. Oliver. 1974. Computers and government department: Controversial topics invited. Comput. Soc., 5(4): 2.Google ScholarGoogle Scholar
  299. R. Osborne. 2011. Civilization: A New History of the Western World. Random House.Google ScholarGoogle Scholar
  300. D. Park. 2015. Social life of PKI: Sociotechnical development of Korean public-key infrastructure. IEEE Ann. Hist. Comput., 37(2): 59–71. DOI: 10.1109/MAHC.2015.22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  301. D. B. Parker. 1976. Computer abuse perpetrators and vulnerabilities of computer systems. In AFIPS '76 Proceedings of the June 7–10, 1976, National Computer Conference and Exposition, pp. 65–73. DOI: 10.1145/1499799.1499810.Google ScholarGoogle ScholarDigital LibraryDigital Library
  302. D. B. Parker. 1981. The impact on computers on trust in business. Comput. Soc., 11(3): 42. DOI: 10.1145/957859.957865.Google ScholarGoogle ScholarDigital LibraryDigital Library
  303. D. B. Parker. 1989. ACM Forum: Beyond worms. Commun. ACM, 32(6): 673.Google ScholarGoogle Scholar
  304. Z. Patterson. 2009. From the gun controller to the mandala: The cybernetic cinema of John and James Whitney. Grey Room, 36: 36–57. DOI: 10.1162/grey.2009.1.36.36.Google ScholarGoogle ScholarCross RefCross Ref
  305. Z. Patterson. 2015. Peripheral Vision: Bell Labs, the SC 4020, and the Origins of Computer Art. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  306. A. Pearl, M. E. Pollack, E. Riskin, E. Wolf, B. Thomas, and A. Wu. 1990. Becoming a computer scientist: A report by the ACM committee on the status of women in computing science. Commun. ACM, 33(11): 47–57. DOI: 10.1145/92755.92757.Google ScholarGoogle ScholarDigital LibraryDigital Library
  307. A. J. Perlis and K. Samelson. 1958. Preliminary report: International algebraic language. Commun. ACM, 1(12): 8–22. DOI: 10.1145/377924.594925.Google ScholarGoogle ScholarDigital LibraryDigital Library
  308. A. J. Perlis and K. Samelson. 1959. Soobshchenie obalgoritmicheskom iazyke ALGOL, translated by A. P. Ershov. Vychislitel'nyi Tsentr AN SSSR, Moscow.Google ScholarGoogle Scholar
  309. A. J. Perlis. 1963. Computation's development critical to our society. Commun. ACM, 6(10): 642. DOI: 10.1145/367651.367695.Google ScholarGoogle ScholarDigital LibraryDigital Library
  310. A. J. Perlis. April 24, 1964. Report of the Commission of Thoughtful Persons to the ACM Council. Commun. ACM, 7(8): 507–508.Google ScholarGoogle Scholar
  311. R. Perry. 1972. The American challenge: Stand on own feet, Perry tells Canada. CIPS Mag., 3(6): 10–11.Google ScholarGoogle Scholar
  312. J. L. Peterson. 1975. Notes on a workshop on distributed computing. Operat. Syst. Rev., 13(3): 20.Google ScholarGoogle Scholar
  313. H. Petroski. 2011. An Engineer's Alphabet: Gleanings from the Softer Side of a Profession. Cambridge University Press, New York.Google ScholarGoogle Scholar
  314. J. R. Pierce. 1967. Computers in Higher Education: Report of the President's Science Advisory Committee. US GPO, Washington, DC.Google ScholarGoogle Scholar
  315. G. M. Pike. November, 1973. ICCP–here's how it works. CIPS Comput. Mag., 11.Google ScholarGoogle Scholar
  316. R. I. Podlovchenko. 2001. A.A. Lyapunov and A.P. Ershov in the theory of program schemes and the development of its logic concepts. In D. Bjørner, M. Broy, and A. V. Zamulin, editors. Perspectives of System Informatics: 4th International Andrei Ershov Memorial Conference, PSI 2001, Revised Papers, pp. 8–23. Springer, Berlin/Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  317. S. V. Pollack, editor. 1982. Studies in Computer Science. Mathematical Association of America, Washington, DC.Google ScholarGoogle Scholar
  318. P. Purdom. 1986. ACM Forum: Reported hacking. Commun. ACM, 29(7): 88–89.Google ScholarGoogle Scholar
  319. R. L. Pyle. 2015. First in the Field: Breaking Ground in Computer Science at Purdue University. Purdue University Press, West Lafayette, IN.Google ScholarGoogle Scholar
  320. A. Ralston and C. L. Meek, editors. 1976. Encyclopedia of Computer Science. Petrocelli/Charter, New York.Google ScholarGoogle Scholar
  321. S. K. Reed and D. K. Branstad, editors. December 10–13, 1974. Controlled Accessibility Workshop Report: A Report of the NBS/ACM Workshop on Controlled Accessibility, December 10–13, 1972, Santa Fe, California. Government Printing Office, Washington DC.Google ScholarGoogle Scholar
  322. J. Reeves. 1984. ACM Forum: Trojan horses and trusty hackers. Commun. ACM, 27(11): 1086.Google ScholarGoogle Scholar
  323. J. B. Reid. 1965. CSC and the metric system. Computer Society of Canada Quarterly Bulletin, 6(1): 21–24.Google ScholarGoogle Scholar
  324. L. Revens. 1987. The first 25 years: ACM 1947–1962. Commun. ACM, 30(10): 860–865. (Originally published Commun. ACM, 15(7): 485–490). DOI: 10.1145/30408.30418.Google ScholarGoogle ScholarDigital LibraryDigital Library
  325. T. S. Reynolds. 1983. 75 Years of Progress: A History of the American Institute of Chemical Engineers, 1908–1983. American Institute of Chemical Engineers, New York.Google ScholarGoogle Scholar
  326. Y. Richmond. 2004. Cultural Exchange and the Cold War: Raising the Iron Curtain. Penn State University Press, University Park.Google ScholarGoogle Scholar
  327. D. M. Ritchie and K. Thompson. 1974. The UNIX time-sharing system. Commun. ACM, 17(7): 365–375. DOI: 10.1145/361011.361061.Google ScholarGoogle ScholarDigital LibraryDigital Library
  328. E. L. Robertson, B. W. Boehm, H. D. Huskey, A. B. Kamman, and M. R. Lackner. 1976. Computers in developing nations. Comput. Soc., 7(2): 7–9. DOI: 10.1145/958838.958840.Google ScholarGoogle ScholarDigital LibraryDigital Library
  329. M. Rosen, editor. 2011. A Little-known Story about a Movement, a Magazine, and the Computer's Arrival in Art: New Tendencies and Bit International, 1961–1973. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  330. D. Rosenberg. 2015. History debugged. In D. R. Dechow and D. C. Struppa, editors. Intertwingled: The Work and Influence of Ted Nelson, pp. 91–103. Springer, Heidelberg. DOI: 10.1007/978-3-319-16925-5_13.Google ScholarGoogle Scholar
  331. M. W. Rossiter. 1993. The Matthew Matilda effect in science. Soc. Stud. Sci., 23(2): 325–341. DOI: 10.1177/030631293023002004.Google ScholarGoogle ScholarCross RefCross Ref
  332. M. W. Rossiter. 1984. Women Scientists in America: Struggles and Strategies to 1940. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  333. M. W. Rossiter. 1995. Women Scientists in America: Before Affirmative Action, 1940–1972. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  334. M. W. Rossiter. 2012. Women Scientists in America: Forging a New World since 1972. Johns Hopkins University Press, Baltimore.Google ScholarGoogle Scholar
  335. B. Rous, B. Shneiderman, N. Yankelovich, and E. Yoder. 1989. Lessons learned from the ACM Hypertext on Hypertext Project. In Proceedings of the Second Annual ACM Conference on Hypertext, (HYPERTEXT '89), pp. 385–386. ACM, New York. DOI: 10.1145/74224.74255.Google ScholarGoogle ScholarDigital LibraryDigital Library
  336. M. Rubinoff. 1964. Impact of computers on society. Commun. ACM, 7(10): 637–638.Google ScholarGoogle Scholar
  337. A. L. Russell. 2014. Accreditation and the boundaries of computer science, 1984–1999. Business History Conference, Frankfurt am Main, Germany. Abstract at http://www.thebhc.org/node/2921.Google ScholarGoogle Scholar
  338. J. E. Sammet. 1966. The use of English as a programming language. Commun. ACM, 9(3): 228–230. DOI: 10.1145/365230.365274.Google ScholarGoogle ScholarDigital LibraryDigital Library
  339. P. J. Sandiford. 1963. The origin and growth of the Canadian Operational Research Society. Journal of the Canadian Operational Research Society, 1(1): 1–13.Google ScholarGoogle Scholar
  340. N. Sawhney, D. Balcom, and I. Smith. 1996. HyperCafe: Narrative and aesthetic properties of hypervideo. In Proceedings of the Hypertext '96 conference, ACM Press, Washington, DC.Google ScholarGoogle Scholar
  341. A. Saxenian. 1994. Regional Advantage: Culture and Competition in Silicon Valley and Route 128. Harvard University Press, Cambridge, MA.Google ScholarGoogle Scholar
  342. M. Schep and N. McNulty. Experiences with using robots in an all-female programming class. ITISCE '02. DOI: 10.1145/637610.544510.Google ScholarGoogle ScholarDigital LibraryDigital Library
  343. C. Schlombs. 2010. A gendered job carousel: Employment effects of computer automation. In T. J. Misa, editor. Gender Codes: Why Women are Leaving Computing, pp. 75–94. Wiley IEEE Computer Society, Hoboken, NJ.Google ScholarGoogle Scholar
  344. M. Schroeder. 1972. Discussion of 'A Hardware Architecture for Implementing Protection Rings'. Operat. Syst. Rev., 6(1): 166.Google ScholarGoogle Scholar
  345. R. Schwarz. 1989. On regulation and legislation. Commun. ACM, 32(8): 918.Google ScholarGoogle Scholar
  346. E. J. Schweppe. 1990. On the genesis of Curriculum 68. In ACM Annual Conference, Washington, DC.Google ScholarGoogle Scholar
  347. D. E. Shalala, chair. 2007. The Committee on Maximizing the Potential of Women in Academic Science and Engineering. Beyond Bias and Barriers: Fulfilling the Potential of Women in Academic Science and Engineering. National Academies Press, Washington, DC.Google ScholarGoogle Scholar
  348. R. S. Sharma. 1986. Data communications and security. SIGSAC Rev., 4(1): 28–38.Google ScholarGoogle ScholarDigital LibraryDigital Library
  349. I. P. Sharp. 1971. Accreditation?–No. CIPS Mag., 2(9): 4–14.Google ScholarGoogle Scholar
  350. H. A. Simon. 1969. The Sciences of the Artificial. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  351. B. Sinclair. 1980. A Centennial History of the American Society of Mechanical Engineers, 1880–1980. University of Toronto Press, Toronto.Google ScholarGoogle Scholar
  352. T. Sito. 2013. Moving Innovation: A History of Computer Animation. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  353. R. Slayton. 2015. Measuring risk: Computer security metrics, automation, and learning. IEEE Ann. Hist. Comput., 37(2): 32–45. DOI: 10.1109/MAHC.2015.30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  354. R. Slayton. 2013. Arguments That Count: Physics, Computing, and Missile Defense, 1949–2012. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  355. A. R. Smith. 2001. Digital paint systems: An anecdotal and historical overview. IEEE Ann. Hist. Comput., 23(2): 4–30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  356. J. B. Smith and F. G. Halasz. 1987. Proceedings of the ACM Conference on Hypertext, ACM Press, New York.Google ScholarGoogle Scholar
  357. J. B. Smith and S. F. Weiss. 1988. Hypertext. Commun. ACM, 31(7): 816–819. DOI: 10.1145/48511.48512.Google ScholarGoogle ScholarDigital LibraryDigital Library
  358. G. Sonnert and G. Holton. 1995. Who Succeeds in Science? Rutgers University Press, New Brunswick, NJ.Google ScholarGoogle Scholar
  359. E. H. Spafford. 1989. Crisis and aftermath. Commun. ACM, 32(6): 678–687.Google ScholarGoogle ScholarDigital LibraryDigital Library
  360. G. Spafford. 2014. We are out of balance. ACM SIGCAS Comput. Soc., 44(4): 9–12. DOI: 10.1145/2695577.2695579.Google ScholarGoogle ScholarDigital LibraryDigital Library
  361. R. E. Sprague. 1974. Issues for SIGCAS. Comput. Soc., 5(3): 3–4.Google ScholarGoogle Scholar
  362. Z. Stachniak and S. Campbell. 2009. Computing in Canada: Building a Digital Future. Canada Science and Technology Museum, Ottawa.Google ScholarGoogle Scholar
  363. Z. Stachniak. 2011. Inventing the PC. McGill-Queen's University Press, Montreal.Google ScholarGoogle Scholar
  364. Richard Stallman. 1984. Hacking away at morality. Commun. ACM, 27(1): 8.Google ScholarGoogle Scholar
  365. B. Sterling. 1992. The Hacker Crackdown: Law and Disorder on the Electronic Frontier. Available at http://www.gutenberg.org/ebooks/101.Google ScholarGoogle Scholar
  366. P. Stewart. May 1968. Faculty profile: David C. Evans. Utechnic: University of Utah Engineering Publication, p. 10.Google ScholarGoogle Scholar
  367. J. Stout and T. Camp. 2014. Now what? Action items from social science research to bridge the gender gap in computing research. ACM SIGCAS Comput. Soc., 44(4): 5–8. DOI: 10.1145/2695577.2695578.Google ScholarGoogle ScholarDigital LibraryDigital Library
  368. M. Strathern. 2004. Commons and Borderlands: Working Papers on Interdisciplinarity, Accountability and the Flow of Knowledge. Sean Kingston Publishing, Oxford, UK.Google ScholarGoogle Scholar
  369. R. H. Stuewer. editor. 1970. Minnesota Studies in the Philosophy of Science, vol. 5, pp. 112–127. University of Minnesota Press, Minneapolis.Google ScholarGoogle Scholar
  370. R. Subramanian and T. Haigh. 2013. Starr Roxanne Hiltz: Pioneer digital sociologist. IEEE Ann. Hist. Comput., 35(1): 78–95.Google ScholarGoogle ScholarDigital LibraryDigital Library
  371. I. Sutherland. 1965. The ultimate display. Proceedings of IFIP Congress, pp. 506–508. DOI: 10.1.1.136.3720.Google ScholarGoogle Scholar
  372. I. Sutherland. 1966. Computer graphics: Ten unsolved problems. Datamation, 12(5): 22–27.Google ScholarGoogle Scholar
  373. K. Tatarchenko. 2010. Cold War origins of the International Federation for Information Processing. IEEE Ann. Hist. Comput., 32(2): 46–57. DOI: 10.1109/MAHC.2010.8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  374. K. Tatarchenko. 2011. Informatika ot Silikonovoi Doliny do Zolotoi Doliny. In A. N. Tomilin, editor. SoRuCom–2011 Proceeding, Second International Conference on the History of Computers and Informatics in the Soviet Union and Russian Federation, Veliky Novgorod, pp. 278–282.Google ScholarGoogle Scholar
  375. K. Tatarchenko. 2013. 'A house with the window to the West': The Akademgorodok Computer Center, 1958–1993. Ph.D. dissertation, Princeton University.Google ScholarGoogle Scholar
  376. O. E. Taulbee and S. D. Conte. 1977. Production and employment of Ph.D.'s in computer science—1976. Commun. ACM, 20(6): 370–372. DOI: 10.1145/359605.359608.Google ScholarGoogle ScholarDigital LibraryDigital Library
  377. M. Tedre. 2014. The Science of Computing: Shaping a Discipline. Chapman and Hall/CRC, London/New York.Google ScholarGoogle Scholar
  378. A. Thackray. 1970. Science: Has its present past a future? In R. H. Stuewer, editor. Historical and Philosophical Perspectives of Science, pp. 112–132. University of Minnesota Press, Minneapolis.Google ScholarGoogle Scholar
  379. L. Thurgood, M. J. Golladay, and S. T. Hill. 2006. U.S. Doctorates in the 20th Century. National Science Foundation, Arlington, VA.Google ScholarGoogle Scholar
  380. J. Titus. 1967. Security and privacy. Commun. ACM, 10(6): 379–380.Google ScholarGoogle ScholarDigital LibraryDigital Library
  381. J. P. Titus. 1967. ARPA: A visible means of support (Washington Commentary). Commun. ACM, 10(8): 519–520. DOI: 10.1145/363534.363564.Google ScholarGoogle ScholarDigital LibraryDigital Library
  382. J. P. Titus. 1967. The patchwork nature of government computing support (Washington Commentary). Commun. ACM, 10(9): 589–592. DOI: 10.1145/363566.363703.Google ScholarGoogle ScholarDigital LibraryDigital Library
  383. A. B. Tucker and N. E. Gibbs. 1984. On accreditation. Commun. ACM, 27(5): 411–412. DOI: 10.1145/358189.381145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  384. A. B. Tucker, editor. 1991. Computing curricula 1991. Commun. ACM, 34(6): 68–84. DOI: 10.1145/103701.103710.Google ScholarGoogle ScholarDigital LibraryDigital Library
  385. R. Turn, E. J. Novotny, J. J. Geraghty, E. H. Sibley, and W. H. Ware. 1982. Observations on the Resilience of the U.S. Information Society. American Federation of Information Processing Societies, Arlington, VA.Google ScholarGoogle Scholar
  386. R. Turn. 1975. Security problems in computer communication systems. Comput. Commun. Rev., 5(1): 35–44. DOI: 10.1145/1024847.1024851.Google ScholarGoogle ScholarDigital LibraryDigital Library
  387. L. Turner. November, 1971. Canadian DPMA Institute formed to deal with domestic problems. Canadian Datasystems, pp. 36–37, 49.Google ScholarGoogle Scholar
  388. L. Turner. 1970. Professionalism: Curse or course. CIPS Mag., 1(4): 21.Google ScholarGoogle Scholar
  389. A. Van Dam. 1988. Hypertext '87 Keynote Address. Commun. ACM, 31(7): 887–895. DOI: 10.1145/48511.48519.Google ScholarGoogle ScholarDigital LibraryDigital Library
  390. J. N. Vardalas. 2001. The Computer Revolution in Canada. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  391. E. J. Vettel. 2004. The protean nature of Stanford University's biological sciences 1946–1972. Hist. Stud. Phys. Biol. Sci., 35(1): 95–113.Google ScholarGoogle ScholarCross RefCross Ref
  392. D. Walden and T. Van Vleck, editors. 2011. The Compatible Time Sharing System (1961–1973): Fiftieth Anniversary Commemorative Overview. IEEE Computer Society.Google ScholarGoogle Scholar
  393. H. M. Walker and C. Kelemen. 2010. Computer science and the liberal arts: A philosophical examination. ACM Trans. Comput. Educ., 10(1): 2:1–2:10. DOI: 10.1145/1731041.1731043.Google ScholarGoogle ScholarDigital LibraryDigital Library
  394. W. H. Ware. 1959. Soviet computer technology: 1959. RAND Corporation, Santa Monica, RM-2541. DOI: 10.1145/367149.1047530.Google ScholarGoogle ScholarDigital LibraryDigital Library
  395. W. H. Ware. 1960. Soviet computer technology—1959. Commun. ACM, 3(3): 131–166. DOI: 10.1145/958858.958859.Google ScholarGoogle ScholarDigital LibraryDigital Library
  396. W. H. Ware. 1967. Security and privacy in computer systems. In Proceedings of the April 18–20, 1967, Spring Joint Computer Conference AFIPS '67, pp. 279–280. ACM Press, New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  397. W. H. Ware. 1977. Testimony before the National Commission of Electronic Fund Transfer. Comput. Soc., 8(1): 2–3.Google ScholarGoogle ScholarDigital LibraryDigital Library
  398. W. H. Ware. 1977. Impact of telecommunications technology on the right to privacy. Comput. Soc., 8(4): 2–5. DOI: 10.1145/958901.958902.Google ScholarGoogle ScholarDigital LibraryDigital Library
  399. W. H. Ware. 1984. Information systems security and privacy. Commun. ACM, 27(4): 315–321.Google ScholarGoogle ScholarDigital LibraryDigital Library
  400. W. H. Ware. 2008. RAND and the Information Evolution: A History in Essays and Vignettes. RAND Corporation, Santa Monica.Google ScholarGoogle Scholar
  401. M. Warner. 2015. Notes on the evolution of computer security policy in the US government, 1965–2003. IEEE Ann. Hist. Comput., 37(2): 8–18. DOI: 10.1109/MAHC.2015.25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  402. J. W. Weaver. 1989. ACM Forum: More on regulation. Commun. ACM, 32(11): 1284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  403. R. Weber and B. Gilchrist. 1975. Discrimination in the employment of women in the computer industry. Commun. ACM, 18(7): 416–418. DOI: 10.1145/360881.360921.Google ScholarGoogle ScholarDigital LibraryDigital Library
  404. D. Weikle. 2014. Letter from the Editor. ACM SIGCAS Comput. Soc., 44(4): 3.Google ScholarGoogle Scholar
  405. F. Weingarten. 1981. Cryptographic research and the computer science community. Commun. ACM, 24(12): 851–853.Google ScholarGoogle Scholar
  406. M. Wetherell, S. Taylor, and S. J. Yates. 2001. Discourse as Data: A Guide for Analysis. Sage Publications, London.Google ScholarGoogle Scholar
  407. P. Wettersten. 1986. ACM Forum: Further observations on hacking. Commun. ACM, 29(9): 829.Google ScholarGoogle ScholarDigital LibraryDigital Library
  408. E. Weyuker. 2009. ACM-W celebrates women in computing. Commun. ACM, 52(6): 5. DOI: 10.1145/1516046.1516047.Google ScholarGoogle ScholarDigital LibraryDigital Library
  409. B. White. 2013. SIGWEB History Project. ACM SIGWEB Newslett., (Spring 2013): 1–5. DOI: 10.1145/2451836.2451837.Google ScholarGoogle ScholarDigital LibraryDigital Library
  410. S. B. Williams. 1954. The Association for Computing Machinery. J. ACM, 1(1): 1–3. DOI: 10.1145/320764.320765.Google ScholarGoogle ScholarDigital LibraryDigital Library
  411. J. A. Wills. 1986. ACM Forum: Reported hacking. Commun. ACM, 29(7): 590.Google ScholarGoogle Scholar
  412. J. M. Wing. 2006. Computational thinking. Commun. ACM, 49(3): 33–35. DOI: 10.1145/1118178.1118215.Google ScholarGoogle ScholarDigital LibraryDigital Library
  413. M. Wisnioski. 2012. Engineers for Change: Competing Visions of Technology in 1960s America. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  414. A. Wright. May 2014. The secret history of hypertext. The Atlantic. Available at http://www.theatlantic.com/technology/archive/2014/05/in-search-of-the-proto-memex/371385/.Google ScholarGoogle Scholar
  415. R. Wright and J. A. Jacobs. 1994. Male flight from computer work: A new look at occupational resegregation and ghettoization. Am. Sociolog. Rev., 59(4): 511–536.Google ScholarGoogle ScholarCross RefCross Ref
  416. M. Wyer, M. Barbercheck, D. Cookmeyer, H. Ozturk, and M. Wayne, editors. 2013. Women, Science, and Technology: A Reader in Feminist Science Studies. Routledge, New York.Google ScholarGoogle Scholar
  417. J. R. Yost. 2007. A History of computer security standards. In K. De Leeuw and J. A. Bergstra, editors. The History of Information Security: A Comprehensive Handbook, pp. 595–621. Elsevier, Amsterdam.Google ScholarGoogle ScholarCross RefCross Ref
  418. J. R. Yost. 2008. From the Editor's desk. IEEE Ann. Hist. Comput., 30(1): 2–3.Google ScholarGoogle ScholarDigital LibraryDigital Library
  419. J. R. Yost. 2015. The origin and early history of the computer security software products industry. IEEE Ann. Hist. Comput., 37(2): 46–58. DOI: 10.1109/MAHC.2015.21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  420. M. Young and J. Muller. 2014. Knowledge, Expertise and the Professions. Routledge, London/New York.Google ScholarGoogle Scholar
  421. Z. Zeller. 1987. Inventing Canada. University of Toronto Press, Toronto.Google ScholarGoogle Scholar
  422. H. Zuckerman, J. R. Cole, and J. T. Bruer, editors. 1992. The Outer Circle: Women in the Scientific Community. Yale University Press, New Haven, CT.Google ScholarGoogle Scholar
  423. L. M. Zurk, et al. 1995. When an advantage is not an advantage. Commun. ACM, 38(12): 17–18.Google ScholarGoogle ScholarDigital LibraryDigital Library
Contributors
  • University of Minnesota Twin Cities
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations