“Communities of Computing” is the first book-length history of the Association for Computing Machinery (ACM), founded in 1947 and with a membership today of 100,000 worldwide. It profiles ACM's notable SIGs, active chapters, and individual members, setting ACM's history into a rich social and political context. The book's 12 core chapters are organized into three thematic sections. “Defining the Discipline” examines the 1960s and 1970s when the field of computer science was taking form at the National Science Foundation, Stanford University, and through ACM's notable efforts in education and curriculum standards.
“Broadening the Profession” looks outward into the wider society as ACM engaged with social and political issues-and as members struggled with balancing a focus on scientific issues and awareness of the wider world. Chapters examine the social turbulence surrounding the Vietnam War, debates about the women's movement, efforts for computing and community education, and international issues including professionalization and the Cold War.
“Expanding Research Frontiers” profiles three areas of research activity where ACM members and ACM itself shaped notable advances in computing, including computer graphics, computer security, and hypertext.
Featuring insightful profiles of notable ACM leaders, such as Edmund Berkeley, George Forsythe, Jean Sammet, Peter Denning, and Kelly Gotlieb, and honest assessments of controversial episodes, the volume deals with compelling and complex issues involving ACM and computing. It is not a narrow organizational history of ACM committees and SIGs, although much information about them is given. All chapters are original works of research. Many chapters draw on archival records of ACM's headquarters, ACM SIGs, and ACM leaders. This volume makes a permanent contribution to documenting the history of ACM and understanding its central role in the history of computing.
Chapters
- E. J. Aarseth. 1997. Cybertext: Perspectives on Ergodic Literature. Johns Hopkins University Press, Baltimore.Google ScholarDigital Library
- J. Abbate. 1999. Inventing the Internet. MIT Press, Cambridge, MA.Google Scholar
- J. Abbate. 2012. Recoding Gender: Women's Changing Participation in Computing. MIT Press, Cambridge, MA.Google ScholarDigital Library
- D. H. Abernathy, J. S. Mancino, C. R. Pearson, and D. C. Swiger. 1973. Survey of design goals for operating systems. Operat. Syst. Rev., 7(2): 19–34. DOI: 10.1145/775260.775263.Google ScholarDigital Library
- A. Akera. 2007. Edmund Berkeley and the origins of ACM. Commun. ACM, 50(5): 30–35. DOI: 10.1145/1230819.1230835.Google ScholarDigital Library
- A. Akera. 2008. Calculating a Natural World: Scientists, Engineers, and Computers during the Rise of US Cold War Research. MIT Press, Cambridge, MA.Google Scholar
- G. Alberts and E. G. Daylight. 2014. Universality versus locality: The Amsterdam style of Algol implementation. IEEE Ann. Hist. Comput., 36(4): 52–63. DOI: 10.1109/MAHC.2014.61.Google ScholarCross Ref
- F. L. Alt. 1962. Fifteen years of ACM. Commun. ACM, 5(6): 300–307. DOI: 10.1145/367766.367777.Google ScholarDigital Library
- The American Association of University Women. 1992. How Schools Shortchange Girls: A Study of Major Findings on Girls and Education. AAUW Educational Foundation, Washington, DC.Google Scholar
- R. E. Anderson. 1981. EDP auditing in the 1980s: Or the vanishing paper trail. SIGSAC Rev., 1(1): 6–15. DOI: 10.1145/1317419.1317420.Google ScholarDigital Library
- R. E. Anderson. 1999. SIGCAS history: The early years. SIGCAS Comput. Soc., 29(4): 4–5. DOI: 10.1145/572199.572200.Google ScholarDigital Library
- H. Arendt. 1966. On the human condition. In A. M. Hilton and Institute for Cybercultural Research, editors. The Evolving Society: The Proceedings of the First Annual Conference on the Cybercultural Revolution—Cybernetics and Automation, pp. 213–220. Institute for Cybercultural Research, New York.Google Scholar
- C. Arnst and A. Dooley. July 23, 1975. Majority of women DPers find no job discrimination. Computerworld, pp. 1–4.Google Scholar
- W. Aspray and B. O. Williams. 1994. Arming American scientists: NSF and the provision of scientific computing facilities for universities, 1950–1973. IEEE Ann. Hist. Comput., 16(4): 60–74.Google ScholarDigital Library
- W. Aspray. 1986. International diffusion of computer technology, 1945–1955. IEEE Ann. Hist. Comput., 8(4): 351–360. DOI: 10.1109/MAHC.1986.10063.Google ScholarDigital Library
- W. Aspray. 2000. Was early entry a competitive advantage? US universities that entered computing in the 1940s. IEEE Ann. Hist. Comput., 22(3): 42–87. DOI: 10.1109/85.859525.Google ScholarDigital Library
- W. Aspray. 2014. Michael Sean Mahoney (1939–2008). IEEE Ann. Hist. Comput., 36(3): 70–79.Google ScholarCross Ref
- W. Aspray. 2016. Participation in Computing: The National Science Foundation's Expansionary Programs. Springer International, Basel.Google Scholar
- W. Asprey and W. Laffan. 1975. Women speak out on DP careers. Datamation, 21(8): 41–44.Google Scholar
- W. F. Atchison and J. W. Hamblen. 1964. Status of computer sciences curricula in colleges and universities. Commun. ACM, 7(4): 225–227.Google ScholarDigital Library
- W. F. Atchison. 1981. Computer education, past, present, and future. SIGCSE Bull., 13(4): 2–6. DOI: 10.1145/989306.989307.Google ScholarDigital Library
- W. F. Atchison, S. D. Conte, J. W. Hamblen, T. E. Hull, T. A. Keenan, W. B. Kehl, E. J. McCluskey, S. O. Navarro, W. C. Rheinboldt, E. J. Schweppe, W. Viavant, and D. M. Young, Jr. 1968. Curriculum 68: Recommendations for academic programs in computer science: A report of the ACM Curriculum Committee on Computer Science. Commun. ACM, 11(3): 151–197. DOI: 10.1145/362929.362976.Google ScholarDigital Library
- L. Bailyn. 2003. Academic careers and gender equity: Lessons learned from MIT. Gender, Work Org., 10(2): 137–153. DOI: 10.1111/1468--0432.00008.Google ScholarCross Ref
- V. Balasubramanian, M. Bieber, and T. Isakowitz. 1996. Systematic Hypermedia Design. Retrieved from http://archive.nyu.edu/bitstream/2451/14198/1/IS-96--09.pdfGoogle Scholar
- D. Banta. 2013. Inspiration lost and found. ACM-W CIS Newslett., 4(2): 22–24.Google Scholar
- J. T. Barber. 2006. The Black Digital Elite. Praeger, Westport, CT.Google Scholar
- T. Bardini. 2000. Bootstrapping: Douglas Engelbart, Coevolution, and the Origins of Personal Computing. Stanford University Press, Stanford.Google ScholarDigital Library
- T. Bardini. 2006. Bridging the gulfs: From hypertext to cyberspace. J. Comput.-Mediat. Commun. 3(2). DOI: 10.1111/j.1083--6101.1997.tb00069.Google Scholar
- M. Bariff. 1981. DP control and standards activities. SIGSAC Rev., 1(1): 20–25.Google ScholarDigital Library
- L. J. Barker and W. Aspray. 2006. The state of research on girls and IT. In J. McGrath Cohoon and W. Aspray, editors. Women and Information Technology: Research on Underrepresentation, pp. 3–54. MIT Press, Cambridge, MA. DOI: 10.7551/mitpress/9780262033459.003.0001.Google Scholar
- B. Barnet. 2013. Memory Machines: The Evolution of Hypertext. Anthem Press, London.Google Scholar
- E. Barrett. 1991. The Society of Text: Hypertext, Hypermedia, and the Social Construction of Information. MIT Press, Cambridge, MA.Google Scholar
- M. Bauman. May 14–16, 1969. Computers and the underprivileged. AFIPS '69 (Spring) Proceedings of the May 14–16, 1969, Spring Joint Computer Conference, pp. 35–36. ACM, New York.Google ScholarDigital Library
- D. O. Belanger. 1998. Enabling American Innovation: Engineering and the National Science Foundation. Purdue University Press, West Lafayette, IN.Google Scholar
- D. Bellin. 1985. High school hackers: Heroes or criminals? Comput. Soc., (14 & 15): 16–17. DOI: 10.1145/379486.379507.Google ScholarDigital Library
- S. Berenson, et al. 2004. Voices of women in a software engineering course: Reflections on collaboration. ACM J. Educ. Resourc. Comput., 4(1): 1–18.Google Scholar
- T. J. Bergin. 2007. A history of the history of programming languages. Commun. ACM, 50(5): 69–74. DOI: 10.1145/1230819.1230841.Google ScholarDigital Library
- T. Berners-Lee and M. Fischetti. 1999. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor. Harper, San Francisco.Google ScholarDigital Library
- A. J. Bernstein. 1971. A programmer training project. Commun. ACM, 14(7): 449–452. DOI: 10.1145/362619.362624.Google ScholarDigital Library
- M. Bernstein. 1999. Everything is intertwingled: Asking again. In Proceedings of the ACM Conference on Hypertext - Hypertext'99, ACM Press. Retrieved from http://www.eastgate.com/ht99/slides/Welcome.htmGoogle Scholar
- K. W. Beyer. 2009. Grace Hopper and the Invention of the Information Age. MIT Press, Cambridge, MA.Google Scholar
- A. S. Bix. 2013. Girls Coming to Tech! A History of American Engineering Education for Women. MIT Press, Cambridge, MA.Google Scholar
- A. Blackwell and K. Rodden. 2003/1963. Preface to this electronic edition. In Sketchpad: A Man-machine Graphical Communication System. Cambridge University Online.Google Scholar
- H. Blinn. 1998. Ten more unsolved problems in computer graphics. IEEE Comput. Graph. Applic., 18(5): 86–89. DOI: 10.1109/38.708564.Google ScholarDigital Library
- B. Bloombecker. 1987. Computer ethics: An antidote to despair. Comput. Soc., 16(4): 3–11. DOI: 10.1145/25601.25602.Google ScholarDigital Library
- B. (J.) Bloombecker. 1983. Conscience in computing: A Law Day perspective on computer crime. Comput. Soc., 13(3): 9–13. DOI: 10.1145/958600.958603.Google ScholarDigital Library
- B. (J.) Bloombecker. 1990. Needed: Binary Bar Mitzvah's and computer confirmations. Comput. Soc., 20(4): 20–21. DOI: 10.1145/122403.122408.Google ScholarDigital Library
- A. Bochannek. 2011. What did the Americans know? A review of select periodicals. In A. N. Tomilin, editor. 2011. SoRuCom–2011 Proceeding, Second International Conference on the History of Computers and Informatics in the Soviet Union and Russian Federation, Veliky Novgorod, pp. 3–7.Google Scholar
- J. D. Bolter. 2001. Writing Space: Computers, Hypertext, and the Remediation of Print. Lawrence Erlbaum Associates, Mahwah, NJ.Google ScholarDigital Library
- J. D. Bolter and M. Joyce. 1987. Hypertext and creative writing. In Proceedings of the ACM Conference on Hypertext–HYPERTEXT '87, pp. 41–50. ACM Press, New York. DOI: 10.1145/317426.317431.Google ScholarDigital Library
- G. Bowker. 1993. How to be universal: Some cybernetic strategies, 1943–70. Soc. Stud. Sci., 23(1): 107–127.Google ScholarCross Ref
- C. P. Brown. 1972. An investigation into the recruitment and training of the disadvantaged for staffing the MIS function. Comput. Personn. Quart. Public. Spec. Inter. Group Comput. Personn. Res., 3(2): 3–8. DOI: 10.1145/1036396.1036397.Google ScholarDigital Library
- J. J. Brown. 1967. Ideas in Exile: A History of Canadian Invention. McClelland and Stewart Ltd., Toronto.Google Scholar
- J. Brown and S. Cunningham. 2007. A history of ACM SIGGRAPH. Commun. ACM, 50(5): 54–61. DOI: 10.1145/1230819.1230839.Google ScholarDigital Library
- P. Brown, C. Gere, N. Lambert, and C. Mason. 2009. White Heat Cold Logic: Early British Computer Art 1960–1980. MIT Press, Cambridge, MA.Google Scholar
- K. B. Bruce, R. D. Cupper, and R. L. S. Drysdale. 2010. A history of the liberal arts computer science consortium and its model curricula. ACM Trans. Comput. Educ., 10(1): 3:1–3:12. DOI: 10.1145/1731041.1731044.Google ScholarDigital Library
- C. Burck, editor. July 1968. Employing the unemployable. Fortune, 78(1): 29–30, 34.Google Scholar
- J. H. Burrows, Chairman. May 14–16, 1969. A panel session: Computers and the underprivileged. AFIPS '69 (Spring) Proceedings of the May 14–16, 1969, Spring Joint Computer Conference, pp. 35–40. ACM, New York.Google Scholar
- V. Bush. July 1945. As we may think. The Atlantic, pp. 101–108. Available at http://www.theatlantic.com/magazine/archive/1945/07/as-we-may-think/303881/Google Scholar
- T. Camp. 1997. The incredible shrinking pipeline. Commun. ACM, 40(10): 103–110.Google ScholarDigital Library
- T. Camp. Response. 1998. Commun. ACM, 41(3): 27–28.Google Scholar
- S. M. Campbell. 2009. Backwater calculations for the St. Lawrence Seaway and the first computer in Canada. Canadian Journal of Civil Engineering, 36(7): 1164–1169.Google ScholarCross Ref
- S. M. Campbell. 2003. Beatrice Helen Worsley: Canada's female computer pioneer. IEEE Ann. Hist. Comput., 25(3): 51–62.Google ScholarDigital Library
- S. M. Campbell. 2006. The premise of computer science: Establishing modern computing at the University of Toronto (1945–1964). Ph.D. thesis, Institute for the History and Philosophy of Science and Technology, University of Toronto.Google Scholar
- M. Campbell-Kelly and W. Aspray. 1996. Computer: A History of the Information Machine. Basic Books, New York.Google ScholarDigital Library
- M. Campbell-Kelly. 1985. Christopher Strachey, 1916–1975: A biographical note. Ann. Hist. Comput., 7(1): 19–42. DOI: 10.1109/MAHC.1985.10001.Google ScholarDigital Library
- R. P. Canavan. 1986. ACM Forum: Reported hacking. Commun. ACM, 29(7): 590.Google Scholar
- L. Candela, D. Castelli, and P. Pagano. 2011. History, evolution, and impact of digital libraries. In I. Iglezakis, T. Synodinou, and S. Kapidakis, editors. E-Publishing and Digital Libraries: Legal and Organizational Issues, pp. 1–30. Information Science Reference, Hershey, PA. DOI: 10.4018/978--1-60960--031-0.ch001.Google Scholar
- R. J. Carnota. 2015. The beginning of computer science in Argentina and the Calculus Institute, 1957–1970. IEEE Ann. Hist. Comput., 37(4): 40–52.Google ScholarCross Ref
- S. J. Ceci and W. M. Williams, editors. 2007. Why Aren't More Women in Science? American Psychological Association, Washington, DC.Google Scholar
- P. E. Ceruzzi. 1998. A History of Modern Computing. MIT Press, Cambridge, MA.Google Scholar
- M. Charland. 1986. Technological nationalism. Canadian Journal of Political and Social Theory, 10(1): 196–220.Google Scholar
- D. Clark and D. Wilson. 1987. A comparison of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 184–194. Oakland, CA. DOI: 10.1109/SP.1987.10001.Google Scholar
- A. Cochran. 1987. ACM: The past 15 years, 1972–1987. Commun. ACM, 30(10): 866–872. DOI: 10.1145/30408.30419.Google ScholarDigital Library
- J. M. Cohoon and W. Aspray, editors. 2006. Women and Information Technology: Research on Underrepresentation. MIT Press, Cambridge, MA.Google Scholar
- J. M. Cohoon and W. Aspray. 2006. A critical review of the research on women's participation in postsecondary computing education. In J. McGrath Cohoon and William Aspray, editors. 2006. Women and Information Technology: Research on Underrepresentation, pp. 137–180. MIT Press, Cambridge, MA. DOI: 10.7551/mitpress/9780262033459.003.0005.Google Scholar
- J. M. Cohoon. 1999. Departmental differences can point the way to improving female retention in computer science. In SIGCSE '99 The Proceedings of the Thirtieth SIGCSE Technical Symposium on Computer Science Education, pp. 198–202. ACM, New York. DOI: 10.1145/299649.299753.Google ScholarDigital Library
- D. E. Comer, D. Gries, M. C. Mulder, A. Tucker, A. J. Turner, and P. R. Young. 1989. Computing as a discipline. Commun. ACM, 32(1): 9–23. DOI: 10.1145/63238.63239.Google ScholarDigital Library
- J. Conklin. 1987. Hypertext: An introduction and survey. IEEE Comput., 20(9): 17–41. DOI: 10.1109/MC.1987.1663693.Google ScholarDigital Library
- S. D. N. Cook and J. S. Brown. 1999. Bridging epistemologies: The generative dance between organizational knowledge and organizational knowing. Org. Sci., 10(4): 381–400. DOI: 10.1287/orsc.10.4.381.Google ScholarDigital Library
- C. Corbett and C. Hill. 2015. Solving the Equation: The Variables for Women's Success in Engineering and Computing. AAUW, Washington DC.Google Scholar
- J. W. Cortada. 2012. The Digital Flood: The Diffusion of Information Technology across the U.S., Europe, and Asia. Oxford University Press, New York.Google Scholar
- D. Crawford. 1989. From Washington: Two bills equal forewarning. Commun. ACM, 32(7): 780–782.Google ScholarDigital Library
- H. Crowther-Heyck. 2005. Herbert A. Simon: The Bounds of Reason in Modern America. Johns Hopkins University Press, Baltimore.Google Scholar
- W. E. Cundiff and M. Reid, editors. 1979. Issues in Canadian/US Transborder Computer Data Flows. Toronto: Institute for Research on Public Policy. DOI: 10.1145/959310.959312.Google ScholarDigital Library
- G. Davida, D. L. Wells, and J. B. Kam. 1981. A database encryption system with subkeys. Trans. Database Syst., 6(2): 312–328. DOI: 10.1145/319566.319580.Google ScholarDigital Library
- C.-S. Davis, A. B. Ginorio, C. S. Hollenshead, B. B. Lazarus, and P. M. Rayman. 1996. The Equity Equation: Fostering the Advancement of Women in the Sciences, Mathematics, and Engineering. Jossey-Bass Publishers, San Francisco.Google Scholar
- P. Davis. January 8, 1998. Remembering George Forsythe. SIAM News. Available at http://www.siam.org/news/news.php?id=805.Google Scholar
- W. A. DeLegall. 1969. Teaching techniques and quality education/training for the 'Disadvantaged'. SIGCPR '69 Proceedings of the Seventh Annual Conference on SIGCPR, pp. 91–94. ACM, New York. DOI: 10.1145/800163.805184.Google ScholarDigital Library
- L. DeNardis. 2015. The Internet design tension between surveillance and security. IEEE Ann. Hist. Comput., 37(2): 72–83. DOI: 10.1109/MAHC.2015.29.Google ScholarDigital Library
- D. E. Denning. 1976. A lattice model of secure information flow. Commun. ACM, 19(5): 236–243.Google ScholarDigital Library
- D. E. Denning. 1980. Secure statistical databases with random sample queries. Trans. Database Syst., 5(3): 291–315. DOI: 10.1145/320613.320616.Google ScholarDigital Library
- D. E. Denning. 1991. The United States vs. Craig Neidorf: A debate on electronic publishing, Constitutional rights, and hacking. Commun. ACM, 34(3): 22–43. DOI: 10.1145/102868.102869.Google ScholarDigital Library
- D. E. Denning and P. J. Denning. 1979. The tracker: A threat to statistical database security. Trans. Database Syst., 4(1): 76–96. DOI: 10.1145/320064.320069.Google ScholarDigital Library
- P. J. Denning. 1977. Discrimination and affirmative action. Commun. ACM, 20(3): 198.Google Scholar
- P. J. Denning. 1988. Edmund C. Berkeley—ACM founder. Commun. ACM, 31(6): 781–782. DOI: 10.1145/62959.214901.Google ScholarDigital Library
- P. J. Denning. 1990. Editorial: Sending a signal. Commun. ACM, 33(8): 11–13.Google ScholarDigital Library
- P. J. Denning and C. H. Martell. 2015. Great Principles of Computing. MIT Press, Cambridge, MA.Google Scholar
- P. J. Denning and H. S. Stone. 1980. An exchange of views on operating systems courses. Operat. Syst. Rev., 14(4): 71–82. DOI: 10.1145/850708.850714.Google ScholarDigital Library
- P. J. Denning, D. H. Brandin, D. C. Schwartz, and G. I. Davida. 1981. Report of the public cryptography study group. Commun. ACM, 24(7): 434–450. DOI: 10.1145/358699.358707.Google ScholarDigital Library
- J. B. Dennis. 1967. A position paper on computing and communications. In SOSP '67 Proceedings of the First ACM Symposium on Operating System Principles, 6.1–6.10. DOI: 10.1145/363095.363147.Google ScholarDigital Library
- L.-B. Desroches, et al. December 1, 2014. Computer usage and national energy consumption: Results from a field-metering study, Lawrence Berkeley National Laboratory, December 1. Available at http://eetd.lbl.gov/sites/all/files/computers\_lbnl\_report\_v4.pdf.Google Scholar
- W. Diffie and M. E. Hellman. 1981. On the security of multiple encryption. Commun. ACM, 24(7): 465–467.Google ScholarDigital Library
- W. Diffie and M. Hellman. June 7–10, 1976. Multiuser cryptographic techniques. In AFIPS '76 Proceedings of the June 7–10, 1976, National Computer Conference, pp. 109–112. DOI: 10.1145/1499799.1499815.Google ScholarDigital Library
- T. A. DiPrete and C. Buchmann. 2013. The Rise of Women: The Growing Gender Gap in Education and What it Means for American Schools. Russell Sage Foundation, New York.Google Scholar
- S. Donig. 2010. Appropriating American technology in the 1960s: Cold War politics and the GDR computer industry. IEEE Ann. Hist. Comput., 32(2): 32–45.Google ScholarDigital Library
- H. Durnova. 2014. Embracing the Algol effort in Czechoslovakia. IEEE Ann. Hist. Comput., 36(4): 26–37. DOI: 10.1109/MAHC.2014.51.Google ScholarCross Ref
- S. Dziallas and S. Fincher. 2015. ACM Curriculum Reports: A pedagogic perspective. In Proceedings of the Eleventh Annual International Conference on International Computing Education Research, pp. 81–89. ACM, New York. DOI: 10.1145/2787622.2787714.Google ScholarDigital Library
- P. N. Edwards. 1996. The Closed World: Computers and the Politics of Discourse in Cold War America. MIT Press, Cambridge, MA.Google Scholar
- G. Engel, J. Impagliazzo, and P. LaMalva. 2009. A brief history of the Computing Sciences Accreditation Board (CSAB): Promoting quality education in the computing fields. In 2009 IEEE Conference on the History of Technical Societies, pp. 1–8. DOI: 10.1109/HTS.2009.5337839.Google Scholar
- D. C. Engelbart. 1986. The augmented knowledge workshop. In Proceedings of the ACM Conference on the History of Personal Workstations, pp. 73–83. ACM Press, New York. DOI: 10.1145/12178.12184.Google ScholarDigital Library
- D. C. Engelbart. 1995. Toward augmenting the human intellect and boosting our collective IQ. Commun. ACM, 38(8): 30–32. DOI: 10.1145/208344.208352.Google ScholarDigital Library
- N. L. Ensmenger. 2001. The 'Question of Professionalism' in the computer fields. IEEE Ann. Hist. Comput., 23(4): 1–19. DOI: 10.1109/85.969964.Google ScholarDigital Library
- N. L. Ensmenger. 2012. The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise. MIT Press, Cambridge, MA.Google Scholar
- N. L. Ensmenger. 2015. 'Beards, sandals, and other signs of rugged individualism': Masculine culture within the computing professions. Osiris, 30(1): 38–65. DOI: 10.1086/682955.Google ScholarCross Ref
- A. P. Ershov. 1963. Input Language for Automatic Programming Systems. Academic Press, New York.Google Scholar
- A. P. Ershov. 1960. Predislovie redaktora perevoda. In P. Naur, editor. Soobshchenie ob algoritmicheskom iazyke ALGOL 60, Moscow/Novosibirsk: Vychislitel'nyi Tsentr AN SSSR, pp. 3–9.Google Scholar
- A. P. Ershov. 1965. The Alpha—An automatic programming system of high efficiency. In Proceedings of IFIP Congress 65, volume 2, pp. 622–623. Macmillan and Co., London. DOI: 10.1145/321312.321314.Google ScholarDigital Library
- A. P. Ershov. 1959. Programming Programme for the BESM Computer. Pergamon Press, London.Google Scholar
- A. P. Ershov and A. A. Liapunov. 1967. O formalizatsii poniatiia programmy. Kibernetika, (5): 40–57.Google Scholar
- A. P. Ershov, S. S. Lavrov, and M. R. Shura-Bura. 1965. In P. Naur, editor. Algoritmicheskii iazyk ALGOL 60: Peresmotrennoe soobshchenie. Mir, Moscow.Google Scholar
- N. Erskine. December 1970. A submission by the Canadian Information Processing Society related to the subject of participation by telecommunication carriers in public data processing. CIPS Mag., 1(11): 10–13.Google Scholar
- U. Feest and F. Steinle, editors. 2012. Scientific Concepts and Investigative Practice. Walter de Gruyter, Berlin.Google Scholar
- E. A. Feigenbaum. May 1965. From Minsk to Pinsk without Intourist. Datamation, 11(5): 34–36.Google Scholar
- E. A. Feigenbaum. 1961. Soviet cybernetics and computer sciences, 1960. Commun. ACM, 4(12): 566–579. DOI: 10.1145/366853.366891.Google ScholarDigital Library
- L. Fein. 1963. Computer-oriented peace research. AFIPS '63 (Fall) Proceedings of the November 12–14, 1963, 631–639. DOI: 10.1145/1463822.1463890.Google ScholarDigital Library
- L. Fein. June 1961. The computer-related sciences (Synnoetics) at a university in the year 1975, Am. Sci., 49(2): 149–168. DOI: 10.1145/364005.364020.Google ScholarDigital Library
- L. Fein. 1959. The role of the university in computers, data processing, and related fields. Commun. ACM, 2(9): 7–14. DOI: 10.1145/1457838.1457859.Google ScholarDigital Library
- W. Fetter. 1982. A progression of human figures simulated by computer graphics. IEEE Comput. Graph. Applic., 2(9): 9–13. DOI: 10.1109/MCG.1982.1674468.Google ScholarDigital Library
- J. Foley. 2000. Getting there: The ten top problems left. IEEE Comput. Graph. Applic., 20(1): 66–68. DOI: 10.1109/38.814569.Google ScholarDigital Library
- K. A. Forcht. 1986. The need for including data security topics in the college business curriculum. SIGSAC Rev., 4(3): 9–11. DOI: 10.1145/1058414.1058416.Google ScholarDigital Library
- D. E. Forsythe. 2001. George and Sandra's daughter, Robert's girl: Doing ethnographic research in my parents' field. In D. J. Hess, editor. Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence, pp. 183–196. Stanford University Press, Stanford.Google Scholar
- D. E. Forsythe. 2001. Disappearing women in the social world of computing. In D. J. Hess, editor. Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence, pp. 163–182. Stanford University Press, Stanford.Google Scholar
- G. E. Forsythe. June 25, 1965. Stanford University's program in computer science. Technical Report CS26. Computer Science Department, Stanford University. Available at http://i.stanford.edu/pub/cstr/reports/cs/tr/65/26/CS-TR-65--26.pdfGoogle Scholar
- G. E. Forsythe. 1967. A university's educational program in computer science. Commun. ACM, 10(1): 3–11. DOI: 10.1145/363018.363038.Google ScholarDigital Library
- G. E. Forsythe. 1965. Official ACM. Commun. ACM, 8(7): 422–426.Google ScholarDigital Library
- G. E. Forsythe. 1968. What to do till the computer scientist comes? Am. Math. Month., 75(5): 454–462. DOI: 10.2307/2314698.Google ScholarCross Ref
- G. Forsythe and W. Wasow. 1960. Finite-Difference Methods for Partial Differential Equations. Wiley, New York.Google Scholar
- G. Forsythe. 1965. President's letter to the ACM membership: Why ACM? Commun. ACM, 8(3): 143–144. DOI: 10.1145/364995.364997.Google ScholarDigital Library
- E. A. Fox, R. M. Akscyn, R. K. Furuta, and J.J. Leggett. 1995. Digital libraries. Commun. ACM, 38(4): 22–28. DOI: 10.1145/205323.205325.Google ScholarDigital Library
- R. D. Francis. 2010. The Technological Imperative in Canada. UBC Press, Vancouver.Google Scholar
- K. Frenkel. 1990. Women and computing. Commun. ACM, 33(11): 34–46.Google ScholarDigital Library
- J. Gaboury. 2015. Hidden surface problems: On the digital image as material object. J. Vis. Cult., 14(1): 40–60. DOI: 10.1177/1470412914562270.Google ScholarCross Ref
- R. S. Gaines. 1975. Session 3: Protection. Operating Systems Review, 9(3): 58. DOI: 10.1145/800272.810900.Google ScholarDigital Library
- R. S. Gaines and D. K. Hsiao. 1975. Preface. In Proceedings of the 1st International Conference on Very Large Data Bases.Google Scholar
- C. Gallagher. 1970. The computer as Rosemary's baby. Comput. Soc., 1(2): 4.Google Scholar
- C. Galvan. 2012. What can we learn from computer engineer Barbie? ACM-W CIS Newsletter, 4(1): 21–32.Google Scholar
- K. Garvin-Doxas and L. J. Barker. 2004. Communication in computer science classrooms: Understanding defensive climates as a means of creating supportive behaviors. ACM J. Educ. Resour. Comput., 4(1): 1–18. DOI: 10.1145/1060071.1060073.Google ScholarDigital Library
- S. Gerovitch. 2001. From Newspeak to Cyberspeak: A History of Soviet Cybernetics. MIT Press, Cambridge, MA.Google Scholar
- E. M. Gerson. 1977. Directory of researchers in computers and society. Comput. Soc., 8(4): 5–9. DOI: 10.1145/958901.958903.Google ScholarDigital Library
- N. E. Gibbs and A. B. Tucker. 1986. A model curriculum for a liberal arts degree in computer science. Commun. ACM, 29(3): 202–210. DOI: 10.1145/5666.5667.Google ScholarDigital Library
- T. F. Gieryn. 1999. Cultural Boundaries of Science: Credibility on the Line. University of Chicago Press, Chicago.Google Scholar
- J. P. Gilbert and D. B. Mayer. 1969. Experiences in self-selection of disadvantaged people into a computer operator training program. SIGCPR '69 Proceedings of the Seventh Annual Conference on SIGCPR, pp. 79–90. ACM, New York. DOI: 10.1145/800163.805183.Google ScholarDigital Library
- C. S. Gillmor. 2004. Fred Terman at Stanford: Building a Discipline, a University, and Silicon Valley. Stanford University Press, Stanford.Google Scholar
- C. Ginzburg. 1980. The Cheese and the Worms: The Cosmos of a Sixteenth-Century Miller. Johns Hopkins University Press, Baltimore.Google Scholar
- E. F. Glynn. 1998. More studies needed. Commun. ACM, 41(3): 27.Google Scholar
- A. Goldberg. 1985. Reliability of computer systems and risks to the public. Commun. ACM, 28(2): 131–133.Google ScholarDigital Library
- M. L. Goldberger, B. A. Maher, and P. E. Flattau, editors. 1995. Research Doctorate Programs in the United States: Continuity and Change. National Academy Press, Washington, DC.Google Scholar
- G. A. Good. 2000. The assembly of geophysics: Scientific disciplines as frameworks of consensus. Stud. Hist. Philoso. Sci. (Part B), 31(3): 259–292. DOI: 10.1016/S1355-2198(00)00018-6.Google ScholarCross Ref
- S. Gorn. 1963. The computer and information sciences: A new basic discipline. SIAM Rev., 5(2): 150–155. DOI: 10.1137/1005036.Google ScholarDigital Library
- C. M. Gorriz and C. Medina. 2000. Engaging girls with computers through software games. Commun. ACM, 43(1): 42–49. DOI: 10.1145/323830.323843.Google ScholarDigital Library
- R. Graham. 1967. Protection in an information utility. In SOSP '67: Proceedings of the First ACM Symposium on Operating System Principles. DOI: 10.1145/800001.811674.Google ScholarDigital Library
- V. Green. 2001. Race on the Line: Gender, Labor, and Technology in the Bell System, 1880–1980. Duke University Press, Durham, NC.Google Scholar
- R. Greenwood, C. R. Hinings, and R. Suddaby. 2002. Theorizing change: The role of professional associations in the transformation of institutionalized fields. Acad. Manage. J., 45(1): 58–80. DOI: 10.2307/3069285.Google Scholar
- D. A. Grier. 2005. When Computers were Human. Princeton University Press, Princeton.Google Scholar
- H. Griffin and P. Gravelle. 1969. Report on the philosophy and mechanics of the urban education committee of Philadelphia. SIGCPR '69 Proceedings of the Seventh Annual Conference on SIGCPR, pp. 95–98. ACM, New York. DOI: 10.1145/800163.805185.Google ScholarDigital Library
- K. Grønbæ k and R. H. Trigg. 1999. From Web to Workplace: Designing Open Hypermedia Systems. MIT Press, Cambridge, MA.Google Scholar
- G. K. Gupta. 2007. Computer science curriculum developments in the 1960s. IEEE Ann. Hist. Comput., 29(2): 40–54.Google ScholarDigital Library
- I. Hacking. 1999. The Social Construction of What? Harvard University Press, Cambridge, MA.Google Scholar
- T. Haigh. 2001. The chromium-plated tabulator: Institutionalizing an electronic revolution, 1954–1958. IEEE Ann. Hist. Comput., 23(4): 75–104. DOI: 10.1109/85.969965.Google ScholarDigital Library
- T. Haigh. 2002. Technology, information and power: Managerial technicians in corporate America, 1917–2000. Ph.D. Dissertation, University of Pennsylvania.Google Scholar
- T. Haigh. 2008. Cleve Moler: Mathematical software pioneer and creator of Matlab. IEEE Ann. Hist. Comput., 30(1): 87–91. DOI: 10.1109/MAHC.2008.2.Google ScholarDigital Library
- T. Haigh. 2010. Masculinity and the masculine man. In T. J. Misa, editor. Gender Codes: Why Women Are Leaving Computing, pp. 51–71. Wiley IEEE Computer Society, Hoboken, NJ.Google Scholar
- T. Haigh, E. Kaplan, and C. Seib. 2007. Sources for ACM history. Commun. ACM, 50(5): 36–41. DOI: 10.1145/1230819.1230836.Google ScholarDigital Library
- T. Haigh, M. Priestley, and C. Rope. 2016. ENIAC in Action: Making and Remaking the Modern Computer. MIT Press, Cambridge, MA.Google ScholarCross Ref
- F. G. Halasz. 1987. Reflections on NoteCards: Seven issues for the next generation of hypermedia systems. In Proceeding of the ACM Conference on Hypertext–HYPERTEXT '87, pp. 345–365. ACM Press, New York. DOI: 10.1145/317426.317451.Google ScholarDigital Library
- F. G. Halasz and M. Schwartz. 1994. The Dexter hypertext reference model. Commun. ACM, 37(2): 30–39. DOI: 10.1145/175235.175237Google ScholarDigital Library
- M. Hall. 2012. Understanding ACM's past. Commun. ACM, 55(12): 5. DOI: 10.1145/2380656.2380657.Google ScholarDigital Library
- W. Hall. 2007. Back to the future with Hypertext: A tale of two or three conferences. In Proceedings of the Eighteenth Conference on Hypertext and Hypermedia, (HT '07), pp. 179–180. ACM, New York. DOI: 10.1145/1286240.1286293.Google ScholarDigital Library
- D. Haltrect. 1970. Computer show/competition. CIPS Mag., 1(7): 10.Google Scholar
- R. Hammerman and A. L. Russell, editors. 2015. Ada's Legacy: Cultures of Computing from the Victorian to the Digital Age. Association for Computing Machinery and Morgan & Claypool, New York. DOI: 10.1145/2809523.Google ScholarDigital Library
- V. Hanson, R. Ayfer, and B. Bachmayer. 2014. European women in computing. Commun. ACM, 57(7): 5.Google ScholarDigital Library
- T. R. Harbron. 1984. More on accreditation. Commun. ACM, 27(10): 988. DOI: 10.1145/358274.358276.Google ScholarDigital Library
- J. Hartmanis. 1992. Computing the future. Commun. ACM, 35(11): 31–40.Google ScholarDigital Library
- J. Hartmanis. 1994. On computational complexity and the nature of computer science. Commun. ACM, 37(10): 37–43. DOI: 10.1145/214037.214040.Google ScholarDigital Library
- J. Hartmanis and H. Lin, editors. 1992. Computing the Future: A Broader Agenda for Computer Science and Engineering. National Academy Press, Washington, DC.Google Scholar
- C. C. Hayes. 2010. Computer science: The incredible shrinking woman. In T. J. Misa, editor. Gender Codes: Why Women are Leaving Computing, pp. 25–49. Wiley IEEE Computer Society, New York. DOI: 10.1002/9780470619926.ch2.Google Scholar
- R. V. Head. 2004. Datamation's glory days. IEEE Ann. Hist. Comput., 26(2): 16–21.Google ScholarDigital Library
- P. Heckbert. April 1987. Ten unsolved problems in rendering. In Workshop on Rendering Algorithms and Systems, Graphics Interface 87, Toronto.Google Scholar
- E. B. Heinlein. 1989. ACM Forum: Beyond worms. Commun. ACM, 32(6): 674.Google Scholar
- V. Henriques. 1970. Computing and the disadvantaged, a panel session. ACM '70: Proceedings of the 1970 25th Annual Conference on Computers and Crisis: How Computers Are Shaping Our Future, pp. 8–15. ACM, New York. DOI: 10.1145/1147347.1147286.Google ScholarDigital Library
- M. J. Heron, P. Belford, and A. Goker. 2014. Sexism in the circuitry: Female participation in male-dominated popular computer culture. ACM SIGCAS Comput. Soc., 44(4): 18–29. DOI: 10.1145/2695577.2695582.Google ScholarDigital Library
- R. Hersch. 1992. In memoriam: Nicholas D. Kazarinoff. SIAM Rev., 34(1): 127. DOI: 10.1137/1034017.Google ScholarCross Ref
- M. Hicks. 2010. Only the clothes changed: Women operators in British computing and advertising, 1950–1970. IEEE Ann. Hist. Comput., 32(2): 2–14. DOI: 10.1109/MAHC.2010.55.Google ScholarDigital Library
- H. Higgins and D. Kahn, editors. 2012. Mainframe Experimentalism: Early Computing and the Foundations of the Digital Arts. University of California Press, Berkeley.Google ScholarCross Ref
- C. Hill, C. Corbett, and A. St. Rose. 2010. Why So Few?: Women in Science, Technology, Engineering, and Mathematics. AAUW, Washington DC.Google Scholar
- M. A. Hiltzik. 1999. Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age. Harper Business.Google Scholar
- L. H. Hin, A. L. Wilkinson, D. H. Anderson, D. P. Chang, W. Wright, A. J. Mayo, I. T. Viney, and R. Williams. 1981. A penetration analysis of a Burroughs large system. Operat. Syst. Rev., 15(1): 14–25. DOI: 10.1145/1041454.1041455.Google ScholarDigital Library
- D. C. Hoefler. January 11, 1971. Silicon Valley in the USA. Electronic News.Google Scholar
- C. Hollenshead, S. Wenzel, B. Lazarus, and I. Nair. 1996. The graduate experiences in the sciences and engineering: Rethinking a gendered institution. In C.-S. Davis, et al., editors. The Equity Equation: Fostering the Advancement of Women in the Sciences, Mathematics, and Engineering, pp. 122–163. Jossey-Bass Publishers, San Francisco.Google Scholar
- D. K. Hsiao. 1980. TODS: The first three years (1976–1978). Trans. Database Syst., 5(4): 385–403. DOI: 10.1145/320610.320611.Google ScholarDigital Library
- J. Hurst, M. S. Mahoney, N. H. Taylor, D. T. Ross, and R. M. Fano. July–August, 1989. Retrospectives I: The early years in computer graphics at MIT, Lincoln Lab and Harvard, and Retrospectives II: The early years in computer graphics at MIT, Lincoln Lab and Harvard. SIGGRAPH '89 Panel Proceedings, July 31–Aug. 4, 1989, pp. 19–73. Association for Computing Machinery, Boston/New York. DOI: 10.1145/77277.77279.Google ScholarDigital Library
- E. T. James, editor. 1971. s.v., “Nora Stanton Blatch Barney.” Notable American Women: A Biographical Dictionary. Belknap Press of Harvard University Press, Cambridge, MA.Google Scholar
- R. F. Johnston. 1952. The University of Toronto electronic computer. ACM '52: Proceedings of the 1952 ACM National Meeting (Toronto), pp. 154–160. ACM Press, New York.Google ScholarCross Ref
- D. H. Jonassen. 1989. Hypertext/Hypermedia. Educational Technology Publications, Englewood Cliffs, NJ.Google Scholar
- A. Kay. 1969. The reactive engine. University of Utah Dissertation.Google Scholar
- E. F. Keller. 1985. Reflections on Gender and Science. Yale University Press, New Haven, CT.Google Scholar
- S. Kim, M. Slater, and E. J. Whitehead, Jr. 2004. WebDAV-based hypertext annotation and Trail System. In Proceedings of the Fifteenth ACM Confereence on Hypertext and Hypermedia—Hypertext'04, pp. 87–88. ACM Press, New York. DOI: 10.1145/1012807.1012832.Google ScholarDigital Library
- A. Kitzmann. 2006. Hypertext Handbook: The Straight Story. Peter Lang, New York.Google Scholar
- M. Klawe and N. Leveson. 1995. Women in computing: Where are we now? Commun. ACM, 38(1): 29–35. DOI: 10.1145/204865.204874.Google ScholarDigital Library
- R. R. Kline. 2015. The Cybernetics Moment: Or Why We Call Our Age the Information Age. Johns Hopkins University Press, Baltimore.Google Scholar
- R. Kling. 1981. Computer abuse and computer crime as organizational activities. Comput. Soc., 11(4): 13. DOI: 10.1145/957869.957871.Google ScholarDigital Library
- R. Kling. 1976. Social impacts of computing. Comput. Soc., 7(2).Google Scholar
- D. E. Knuth. 1972. George Forsythe and the development of computer science. Commun. ACM, 15(8): 721–727. DOI: 10.1145/361532.361538.Google ScholarDigital Library
- D. E. Knuth. 1974. Computer science and its relation to mathematics. Am. Math. Month., 81: 323–343. DOI: 10.2307/2318994.Google ScholarCross Ref
- N. Krementsov. 2005. International Science between the World Wars: The Case of Genetics. Routledge, New York.Google Scholar
- J. Krige. 2006. Atoms for Peace, scientific internationalism, and scientific intelligence. Osiris, 21:161–181. DOI: 10.1086/507140.Google ScholarCross Ref
- F. N. Krull. 1994. The origin of computer graphics within General Motors. IEEE Ann. Hist. Comput., 16(3): 40–56. DOI: 10.1109/MAHC.1994.298419.Google ScholarDigital Library
- B. Lampson. 1973. A note on the confinement problem. Commun. ACM, 16(10): 613–15. DOI: 10.1145/362375.362389.Google ScholarDigital Library
- B. Lampson. 1971. Protection. Operat. Syst. Rev., 8(1): 18. Reprinted from Butler Lampson, Protection. In Proceedings of Fifth Princeton Symposium on Information Sciences and Systems, pp. 437–443. Princeton.Google ScholarDigital Library
- B. Lampson, et al. 1977. Protection, security, reliability. Operat. Syst. Rev., 11(1): 13.Google Scholar
- C. P. Landis. 1973. Computer records and people. Comput. Soc., 4(3): 15.Google Scholar
- G. P. Landow. 2006. Hypertext 3.0: Critical Theory and New Media in an Era of Globalization. Johns Hopkins University Press, Baltimore.Google Scholar
- B. F. Laposky. 1969. Oscillons: Electronic abstractions. Leonardo, 2(4): 345–354. DOI: 10.2307/1572117.Google ScholarCross Ref
- R. D. Launius. 1999. NASA history and the challenge of keeping the contemporary past. Publ. Hist., 21(3): 63–81. DOI: 10.2307/3378961.Google ScholarCross Ref
- J. A. N. Lee, G. Segal, and R. Steier. 1986. Positive alternatives: A report on an ACM panel on hacking. Commun. ACM, 29(4): 297–299. DOI: 10.1145/5684.6377.Google ScholarDigital Library
- A. Leonard. June 10, 1999. Can history survive Silicon Valley? Salon. http://www.salon.com/1999/06/10/stanford/.Google Scholar
- S. Levy. 2001. Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age. Penguin Books, New York.Google Scholar
- N. Lewis. 2016. Peering through the curtain: Soviet computing through the eyes of western experts. IEEE Ann. Hist. Comput., 38(1): 34–47. DOI: 10.1109/MAHC.2015.48Google ScholarDigital Library
- A. A. Liapunov. 1958. O logicheskikh skhemakh programm. Problemy Kibernetiki, 1: 46–74. Fizmatgiz, Moscow.Google Scholar
- J. C. R. Licklider. 1960. Man-computer symbiosis. IRE Trans. Hum. Fact. Electron., 1:4–11. DOI: 10.1109/THFE2.1960.4503259.Google ScholarCross Ref
- J. Light. 1999. When computers were women. Technol. Cult., 40(3): 455–483. Available at http://www.jstor.org/stable/25147356.Google ScholarCross Ref
- S. B. Lipner. 1975. A comment on the confinement problem. SOSP '75 Symposium on Operating System Principles, pp. 192–196. DOI: 10.1145/1067629.806537.Google ScholarDigital Library
- S. B. Lipner. 2015. The birth and death of the Orange Book. IEEE Ann. Hist. Comput., 37(2): 19–31. DOI: 10.1109/MAHC.2015.27.Google ScholarDigital Library
- J. S. Long and M. F. Fox. 1995. Scientific careers: Universalism and particularism. Ann. Rev. Sociol., 21:45–71.Google ScholarCross Ref
- B. Longo. 2007. ACM established to develop communication about computing. Commun. ACM, 50(5): 27–29. DOI: 10.1145/1230819.1230834.Google ScholarDigital Library
- B. Longo. 2015. Edmund Berkeley and the Social Responsibility of Computer Professionals. Association for Computing Machinery and Morgan & Claypool, New York. DOI: 10.1145/2787754.Google ScholarDigital Library
- Iu. M. Lotman and B. A. Uspenskii. 1987. Pis'ma russkogo puteshestvennika Karamzina i ikh mesto v razvitii russkoi kul'tury. Introductory note to Pis'ma russkogo puteshestvennika by N. M. Karamzin, pp. 525–606. Nauka, Leningrad.Google Scholar
- R. S. Lowen. 1997. Creating the Cold War University: The Transformation of Stanford. University of California Press, Berkeley.Google Scholar
- J. Lucena. 2005. Defending the Nation: U.S. Policymaking to Create Scientists and Engineers from Sputnik to the 'War against Terrorism'. University Press of America, Lanham, MD.Google Scholar
- R. MacDougall. 2007. All red dream: Technological nationalism at the Trans-Canada Telephone System. In N. Hillmer and A. Chapnick, editors. Canadas of the Mind: The Making and Unmaking of Canadian Nationalisms in the Twentieth Century, pp. 47–62. McGill-Queen's University Press, Montreal & Kingston.Google Scholar
- D. MacKenzie. 2001. Mechanizing Proof: Computing, Risk, and Trust. MIT Press, Cambridge, MA.Google Scholar
- M. S. Mahoney. 2001. Boys' toys and women's work: Feminism engages software. In A. N. H. Creager, E. Lunbeck, and L. Schiebinger, editors. Feminism in Twentieth Century Science, Technology and Medicine, pp. 169–185. University of Chicago Press, Chicago.Google Scholar
- M. Mahoney. 1997. Computer science: The search for a mathematical theory. In J. Krige and D. Pestre, editors. Science in the Twentieth Century, pp. 617–634. Harwood Academic Publishers, Amsterdam.Google Scholar
- M. Mahoney. 2002. Software: The self-programming machine. In A. Akera and F. Nebeker, editors. From 0 to 1: An Authoritative History of Modern Computing, pp. 91–100. Oxford University Press, New York.Google Scholar
- M. S. Mahoney. In T. Haigh, editor. 2011. Histories of Computing. Harvard University Press, Cambridge, MA.Google Scholar
- S. Marenco. 2013. Barbie I Can Be…a Computer Engineer. Random House, New York.Google Scholar
- J. Margolis and A. Fisher. 2002. Unlocking the Clubhouse: Women in Computing. MIT Press, Cambridge, MA.Google Scholar
- C. J. Martincic and N. Bhatnagar. 2012. Will computer engineer Barbie impact young women's career choices? Inform. Syst. Educ. J., 10(6): 4–14.Google Scholar
- J. Matthews. 1989. ACM Forum: Worm turns. Commun. ACM, 32(9): 1044.Google ScholarDigital Library
- D. B. Mayer. November 18–20, 1969. The involved generation: Computing people and the disadvantaged. AFIPS '69 (Fall) Proceedings of the November 18–20, 1969, Fall Joint Computer Conference, pp. 679–690. ACM, New York. DOI: 10.1145/1478559.1478642.Google ScholarDigital Library
- D. R. McCamus. 1970. They worry too much. CIPS Mag., 1(2): 21.Google Scholar
- D. D. McCracken. 1974. A problem-list of issues concerning computers and public policy. Commun. ACM, 17(9): 496–503.Google Scholar
- D. McCullough. 1988. Noninterference and the composibility of security properties. IEEE Symposium on Security and Privacy, Computer Society Press of the IEEE, pp. 177–86.Google Scholar
- M. D. McIlroy. 1990. ACM Forum: Green light for bad software. Commun. ACM, 33(5): 479.Google ScholarDigital Library
- J. S. McIlwee and J. G. Robinson. 1992. Women in Engineering: Gender, Power, and Workplace Culture. SUNY Press, Albany.Google Scholar
- A. M. McMahon. 1984. The Making of a Profession: A Century of Electrical Engineering in America. Institute of Electrical and Electronics Engineers, New York.Google Scholar
- R. Merkle. 1978. Secure communications over insecure channels. Commun. ACM, 21(4): 294–299. DOI: 10.1145/359460.359473.Google ScholarDigital Library
- L. Mezei. 1965. The social responsibility of computer specialists. Computing and Data Processing Society of Canada Quarterly Bulletin, 5(3): 32–43, 51.Google Scholar
- L. Mezei. 1969. Social responsibility. Information Processing Society of Canada Quarterly Bulletin, 9(2): 5–6.Google Scholar
- J. Minker. 1981. Computer scientists whose scientific freedom and human rights have been violated: A report of the ACM committee on scientific freedom and human rights. Commun. ACM, 24(3): 134–139. DOI: 10.1145/358568.358584.Google ScholarDigital Library
- T. J. Misa, editor. 2010. Gender Codes: Why Women are Leaving Computing. Wiley IEEE Computer Society, Hoboken, NJ.Google ScholarCross Ref
- T. J. Misa. 2010. Gender codes: Defining the problem. In T. J. Misa, editor. Gender Codes: Why Women Are Leaving Computing, pp. 3–23. Wiley-IEEE Computer Society, Hoboken, NJ.Google ScholarCross Ref
- T. J. Misa. 2012 & 2013. Charles Babbage Institute: Glimpses of the founding. CBI Newslett., 34(2) and 35(1). Available at http://www.cbi.umn.edu/about/nsl/v34n2.pdf\#page=4 and http://www.cbi.umn.edu/about/nsl/v35n1.pdf\#page=19.Google Scholar
- T. J. Misa. 2015. Computing is history. Commun. ACM, 58(10): 35–37. DOI: 10.1145/2814845.Google ScholarDigital Library
- T. J. Misa. 2016. Charles Babbage, Ada Lovelace, and the Bernoulli numbers. In R. Hammerman and A. L. Russell, editors. Ada's Legacy. ACM and Morgan & Claypool, New York.Google Scholar
- R. Montanelli and S. Mamrak. 1976. The status of women and minorities in academic computer science. Commun. ACM, 19(10): 578–581. DOI: 10.1145/360349.360361.Google ScholarDigital Library
- L. B. Moore. 1971. Unhindered. CIPS Mag., 2(9): 12–14.Google Scholar
- M. G. Morgan, M. R. Mirabito, and N. J. Down. 1970. Computer jobs through training: A preliminary project report. AFIPS '70 (Fall): Proceedings of the November 17-19, 1970, Fall Joint Computer Conference, p. 346. ACM, New York.Google Scholar
- M. G. Morgan, N. J. Down, and R. W. Sadler. December 5–7, 1972. Computer jobs through training: A final project report. 1972 Fall Joint Computer Conference. AFIPS Conference Proceedings, Vol. 41, Part II, pp. 1243–1249. American Federation of Information Processing Societies, Inc., Montvale, NJ. DOI: 10.1145/1480083.148016.Google Scholar
- P. M. Morse. June 2–4, 1960. Report on a conference of university computing center directors. Commun. ACM, 3(10): 519–521. DOI: 10.1145/367415.993448.Google ScholarDigital Library
- A. L. Morton, Jr. May 14–16, 1969. Computers and the underprivileged. AFIPS '69 (Spring) Proceedings of the May 14–16, 1969, Spring Joint Computer Conference, pp. 37–38. ACM, New York. DOI: 10.1145/1476793.1476806.Google ScholarDigital Library
- P. Mounier-Kuhn. 2012. Computer science in French universities: Early entrants and latecomers. Inform. Cult. J. Hist., 47(4): 414–456.Google Scholar
- M. C. Mulder. 1975. Model curricula for four-year computer science and engineering programs: Bridging the tar pit. Computer, 8(12): 28–33. DOI: 10.1109/C-M.1975.218831.Google ScholarDigital Library
- M. C. Mulder and J. Dalphin. 1984. Computer science program requirements and accreditation. Commun. ACM, 27(4): 330–335. DOI: 10.1145/358027.358036.Google ScholarDigital Library
- W. Myers. 1986. Computing sciences accreditation pro and con. Computer, 19(6): 47–49. DOI: 10.1109/MC.1986.1663252.Google ScholarDigital Library
- T. Narten and E. H. Spafford. 1989. ACM Forum: Beyond worms. Commun. ACM, 32(6): 673–674.Google Scholar
- R. A. Nelsen. 2017. Race and computing: The problem of sources, the potential of prosopography, and the lesson of Ebony magazine. IEEE Ann. Hist. Comput., (forthcoming 2017). DOI: 10.1109/MAHC.2016.11.Google ScholarDigital Library
- T. Nelson. 1974. Computer Lib/Dream Machines. Mindful Press, Sausalito, CA.Google Scholar
- T. H. Nelson. 1965. Complex information processing: A file structure for the complex, the changing and the indeterminate. In Proceedings of the 20th National Conference, pp. 84–100. ACM Press, New York. DOI: 10.1145/800197.806036.Google ScholarDigital Library
- M. Nerland and B. Karseth. 2015. The knowledge work of professional associations: Approaches to standardisation and forms of legitimisation. J. Educ. Work, 28(1): 1–23. DOI: 10.1080/13639080.2013.802833.Google ScholarCross Ref
- J. J. Nersessian. 2010. Creating Scientific Concepts. MIT Press, Cambridge, MA.Google Scholar
- B. Neugent. 1986. Preposterous opinions about computer security. SIGSAC Rev., 4(3): 1–8. DOI: 10.1145/1058414.1058415.Google ScholarDigital Library
- P. G. Neumann. March 29, 1991. More on Computers, Freedom, and Privacy. Available at http://catless.ncl.ac.uk/Risks/11.35.html\#subj3.1Google Scholar
- P. G. Neumann, S. Peisert, and M. Schaefer. 2014. The IEEE Symposium on Security and Privacy, in retrospect. IEEE Secur. Priv., 12(3): 15–17.Google ScholarCross Ref
- A. Newell, A. J. Perlis, and H. A. Simon. 1967. Letters: Computer science. Science, 157(22): 1373–1374. http://www.jstor.org/stable/1723308.Google ScholarCross Ref
- M. Newell and J. Blinn. 1977. The progression of realism in computer generated images. ACM '77 Proceedings of the 1977 Annual Conference, pp. 444–448. ACM, New York.Google Scholar
- J. Nielsen. 1995. Multimedia and Hypertext: The Internet and Beyond. Morgan Kaufmann.Google Scholar
- I. Nikiforova. 2012. The paradox of excellence: Merit and occupational attainments of women in computer science. In Proceedings from GEXcel Theme 11–12: Gender Paradoxes in Changing Academic and Scientific Organisation(s), pp. 49–56. LiU-Tryck, Linköping University Press, Linköping.Google Scholar
- D. Nofre, M. Priestley, and G. Alberts. 2014. When technology became language: The origins of the linguistic conception of computer programming, 1950–1960. Technol. Cult., 55(1): 40–75. DOI: 10.1353/tech.2014.0031.Google ScholarCross Ref
- A. Norberg. 2003. Twenty-five years of the Charles Babbage Institute. CBI Newsletter 26(1). Available at http://www.cbi.umn.edu/about/nsl/v26n1graphics.pdf\#page=3.Google Scholar
- A. L. Norberg and J. E. O'Neill. 1996. Transforming Computer Technology: Information Processing for the Pentagon, 1962–1986. Johns Hopkins University Press, Baltimore.Google Scholar
- J. November. 2007. George Elmer Forsythe. In The New Dictionary of Scientific Biography. Charles Scribner's Sons, New York.Google Scholar
- J. November. 2012. Biomedical Computing: Digitizing Life in the United States. Johns Hopkins University Press, Baltimore.Google Scholar
- A. G. Oettinger. 1966. On ACM's responsibility. Commun. ACM, 9(4): 246. DOI: 10.1145/365278.365290.Google ScholarDigital Library
- R. Oldenziel. 2003. Multiple-entry visas: Gender and engineering in the US, 1870–1945. In A. Canel, R. Oldenziel, and K. Zachmann, editors. Crossing Boundaries, Building Bridges: Comparing the History of Women Engineers, 1870s–1990s, pp. 11–49. Routledge, New York.Google Scholar
- J. D. Oldham. 2009. Examining computers and society 1970–2008. Comput. Soc., 39(2): 34–42. DOI: 10.1145/1621918.1621930.Google ScholarDigital Library
- J. R. Oliver. 1974. Computers and government department: Controversial topics invited. Comput. Soc., 5(4): 2.Google Scholar
- R. Osborne. 2011. Civilization: A New History of the Western World. Random House.Google Scholar
- D. Park. 2015. Social life of PKI: Sociotechnical development of Korean public-key infrastructure. IEEE Ann. Hist. Comput., 37(2): 59–71. DOI: 10.1109/MAHC.2015.22.Google ScholarDigital Library
- D. B. Parker. 1976. Computer abuse perpetrators and vulnerabilities of computer systems. In AFIPS '76 Proceedings of the June 7–10, 1976, National Computer Conference and Exposition, pp. 65–73. DOI: 10.1145/1499799.1499810.Google ScholarDigital Library
- D. B. Parker. 1981. The impact on computers on trust in business. Comput. Soc., 11(3): 42. DOI: 10.1145/957859.957865.Google ScholarDigital Library
- D. B. Parker. 1989. ACM Forum: Beyond worms. Commun. ACM, 32(6): 673.Google Scholar
- Z. Patterson. 2009. From the gun controller to the mandala: The cybernetic cinema of John and James Whitney. Grey Room, 36: 36–57. DOI: 10.1162/grey.2009.1.36.36.Google ScholarCross Ref
- Z. Patterson. 2015. Peripheral Vision: Bell Labs, the SC 4020, and the Origins of Computer Art. MIT Press, Cambridge, MA.Google Scholar
- A. Pearl, M. E. Pollack, E. Riskin, E. Wolf, B. Thomas, and A. Wu. 1990. Becoming a computer scientist: A report by the ACM committee on the status of women in computing science. Commun. ACM, 33(11): 47–57. DOI: 10.1145/92755.92757.Google ScholarDigital Library
- A. J. Perlis and K. Samelson. 1958. Preliminary report: International algebraic language. Commun. ACM, 1(12): 8–22. DOI: 10.1145/377924.594925.Google ScholarDigital Library
- A. J. Perlis and K. Samelson. 1959. Soobshchenie obalgoritmicheskom iazyke ALGOL, translated by A. P. Ershov. Vychislitel'nyi Tsentr AN SSSR, Moscow.Google Scholar
- A. J. Perlis. 1963. Computation's development critical to our society. Commun. ACM, 6(10): 642. DOI: 10.1145/367651.367695.Google ScholarDigital Library
- A. J. Perlis. April 24, 1964. Report of the Commission of Thoughtful Persons to the ACM Council. Commun. ACM, 7(8): 507–508.Google Scholar
- R. Perry. 1972. The American challenge: Stand on own feet, Perry tells Canada. CIPS Mag., 3(6): 10–11.Google Scholar
- J. L. Peterson. 1975. Notes on a workshop on distributed computing. Operat. Syst. Rev., 13(3): 20.Google Scholar
- H. Petroski. 2011. An Engineer's Alphabet: Gleanings from the Softer Side of a Profession. Cambridge University Press, New York.Google Scholar
- J. R. Pierce. 1967. Computers in Higher Education: Report of the President's Science Advisory Committee. US GPO, Washington, DC.Google Scholar
- G. M. Pike. November, 1973. ICCP–here's how it works. CIPS Comput. Mag., 11.Google Scholar
- R. I. Podlovchenko. 2001. A.A. Lyapunov and A.P. Ershov in the theory of program schemes and the development of its logic concepts. In D. Bjørner, M. Broy, and A. V. Zamulin, editors. Perspectives of System Informatics: 4th International Andrei Ershov Memorial Conference, PSI 2001, Revised Papers, pp. 8–23. Springer, Berlin/Heidelberg.Google ScholarCross Ref
- S. V. Pollack, editor. 1982. Studies in Computer Science. Mathematical Association of America, Washington, DC.Google Scholar
- P. Purdom. 1986. ACM Forum: Reported hacking. Commun. ACM, 29(7): 88–89.Google Scholar
- R. L. Pyle. 2015. First in the Field: Breaking Ground in Computer Science at Purdue University. Purdue University Press, West Lafayette, IN.Google Scholar
- A. Ralston and C. L. Meek, editors. 1976. Encyclopedia of Computer Science. Petrocelli/Charter, New York.Google Scholar
- S. K. Reed and D. K. Branstad, editors. December 10–13, 1974. Controlled Accessibility Workshop Report: A Report of the NBS/ACM Workshop on Controlled Accessibility, December 10–13, 1972, Santa Fe, California. Government Printing Office, Washington DC.Google Scholar
- J. Reeves. 1984. ACM Forum: Trojan horses and trusty hackers. Commun. ACM, 27(11): 1086.Google Scholar
- J. B. Reid. 1965. CSC and the metric system. Computer Society of Canada Quarterly Bulletin, 6(1): 21–24.Google Scholar
- L. Revens. 1987. The first 25 years: ACM 1947–1962. Commun. ACM, 30(10): 860–865. (Originally published Commun. ACM, 15(7): 485–490). DOI: 10.1145/30408.30418.Google ScholarDigital Library
- T. S. Reynolds. 1983. 75 Years of Progress: A History of the American Institute of Chemical Engineers, 1908–1983. American Institute of Chemical Engineers, New York.Google Scholar
- Y. Richmond. 2004. Cultural Exchange and the Cold War: Raising the Iron Curtain. Penn State University Press, University Park.Google Scholar
- D. M. Ritchie and K. Thompson. 1974. The UNIX time-sharing system. Commun. ACM, 17(7): 365–375. DOI: 10.1145/361011.361061.Google ScholarDigital Library
- E. L. Robertson, B. W. Boehm, H. D. Huskey, A. B. Kamman, and M. R. Lackner. 1976. Computers in developing nations. Comput. Soc., 7(2): 7–9. DOI: 10.1145/958838.958840.Google ScholarDigital Library
- M. Rosen, editor. 2011. A Little-known Story about a Movement, a Magazine, and the Computer's Arrival in Art: New Tendencies and Bit International, 1961–1973. MIT Press, Cambridge, MA.Google Scholar
- D. Rosenberg. 2015. History debugged. In D. R. Dechow and D. C. Struppa, editors. Intertwingled: The Work and Influence of Ted Nelson, pp. 91–103. Springer, Heidelberg. DOI: 10.1007/978-3-319-16925-5_13.Google Scholar
- M. W. Rossiter. 1993. The Matthew Matilda effect in science. Soc. Stud. Sci., 23(2): 325–341. DOI: 10.1177/030631293023002004.Google ScholarCross Ref
- M. W. Rossiter. 1984. Women Scientists in America: Struggles and Strategies to 1940. Johns Hopkins University Press, Baltimore.Google Scholar
- M. W. Rossiter. 1995. Women Scientists in America: Before Affirmative Action, 1940–1972. Johns Hopkins University Press, Baltimore.Google Scholar
- M. W. Rossiter. 2012. Women Scientists in America: Forging a New World since 1972. Johns Hopkins University Press, Baltimore.Google Scholar
- B. Rous, B. Shneiderman, N. Yankelovich, and E. Yoder. 1989. Lessons learned from the ACM Hypertext on Hypertext Project. In Proceedings of the Second Annual ACM Conference on Hypertext, (HYPERTEXT '89), pp. 385–386. ACM, New York. DOI: 10.1145/74224.74255.Google ScholarDigital Library
- M. Rubinoff. 1964. Impact of computers on society. Commun. ACM, 7(10): 637–638.Google Scholar
- A. L. Russell. 2014. Accreditation and the boundaries of computer science, 1984–1999. Business History Conference, Frankfurt am Main, Germany. Abstract at http://www.thebhc.org/node/2921.Google Scholar
- J. E. Sammet. 1966. The use of English as a programming language. Commun. ACM, 9(3): 228–230. DOI: 10.1145/365230.365274.Google ScholarDigital Library
- P. J. Sandiford. 1963. The origin and growth of the Canadian Operational Research Society. Journal of the Canadian Operational Research Society, 1(1): 1–13.Google Scholar
- N. Sawhney, D. Balcom, and I. Smith. 1996. HyperCafe: Narrative and aesthetic properties of hypervideo. In Proceedings of the Hypertext '96 conference, ACM Press, Washington, DC.Google Scholar
- A. Saxenian. 1994. Regional Advantage: Culture and Competition in Silicon Valley and Route 128. Harvard University Press, Cambridge, MA.Google Scholar
- M. Schep and N. McNulty. Experiences with using robots in an all-female programming class. ITISCE '02. DOI: 10.1145/637610.544510.Google ScholarDigital Library
- C. Schlombs. 2010. A gendered job carousel: Employment effects of computer automation. In T. J. Misa, editor. Gender Codes: Why Women are Leaving Computing, pp. 75–94. Wiley IEEE Computer Society, Hoboken, NJ.Google Scholar
- M. Schroeder. 1972. Discussion of 'A Hardware Architecture for Implementing Protection Rings'. Operat. Syst. Rev., 6(1): 166.Google Scholar
- R. Schwarz. 1989. On regulation and legislation. Commun. ACM, 32(8): 918.Google Scholar
- E. J. Schweppe. 1990. On the genesis of Curriculum 68. In ACM Annual Conference, Washington, DC.Google Scholar
- D. E. Shalala, chair. 2007. The Committee on Maximizing the Potential of Women in Academic Science and Engineering. Beyond Bias and Barriers: Fulfilling the Potential of Women in Academic Science and Engineering. National Academies Press, Washington, DC.Google Scholar
- R. S. Sharma. 1986. Data communications and security. SIGSAC Rev., 4(1): 28–38.Google ScholarDigital Library
- I. P. Sharp. 1971. Accreditation?–No. CIPS Mag., 2(9): 4–14.Google Scholar
- H. A. Simon. 1969. The Sciences of the Artificial. MIT Press, Cambridge, MA.Google Scholar
- B. Sinclair. 1980. A Centennial History of the American Society of Mechanical Engineers, 1880–1980. University of Toronto Press, Toronto.Google Scholar
- T. Sito. 2013. Moving Innovation: A History of Computer Animation. MIT Press, Cambridge, MA.Google Scholar
- R. Slayton. 2015. Measuring risk: Computer security metrics, automation, and learning. IEEE Ann. Hist. Comput., 37(2): 32–45. DOI: 10.1109/MAHC.2015.30.Google ScholarDigital Library
- R. Slayton. 2013. Arguments That Count: Physics, Computing, and Missile Defense, 1949–2012. MIT Press, Cambridge, MA.Google Scholar
- A. R. Smith. 2001. Digital paint systems: An anecdotal and historical overview. IEEE Ann. Hist. Comput., 23(2): 4–30.Google ScholarDigital Library
- J. B. Smith and F. G. Halasz. 1987. Proceedings of the ACM Conference on Hypertext, ACM Press, New York.Google Scholar
- J. B. Smith and S. F. Weiss. 1988. Hypertext. Commun. ACM, 31(7): 816–819. DOI: 10.1145/48511.48512.Google ScholarDigital Library
- G. Sonnert and G. Holton. 1995. Who Succeeds in Science? Rutgers University Press, New Brunswick, NJ.Google Scholar
- E. H. Spafford. 1989. Crisis and aftermath. Commun. ACM, 32(6): 678–687.Google ScholarDigital Library
- G. Spafford. 2014. We are out of balance. ACM SIGCAS Comput. Soc., 44(4): 9–12. DOI: 10.1145/2695577.2695579.Google ScholarDigital Library
- R. E. Sprague. 1974. Issues for SIGCAS. Comput. Soc., 5(3): 3–4.Google Scholar
- Z. Stachniak and S. Campbell. 2009. Computing in Canada: Building a Digital Future. Canada Science and Technology Museum, Ottawa.Google Scholar
- Z. Stachniak. 2011. Inventing the PC. McGill-Queen's University Press, Montreal.Google Scholar
- Richard Stallman. 1984. Hacking away at morality. Commun. ACM, 27(1): 8.Google Scholar
- B. Sterling. 1992. The Hacker Crackdown: Law and Disorder on the Electronic Frontier. Available at http://www.gutenberg.org/ebooks/101.Google Scholar
- P. Stewart. May 1968. Faculty profile: David C. Evans. Utechnic: University of Utah Engineering Publication, p. 10.Google Scholar
- J. Stout and T. Camp. 2014. Now what? Action items from social science research to bridge the gender gap in computing research. ACM SIGCAS Comput. Soc., 44(4): 5–8. DOI: 10.1145/2695577.2695578.Google ScholarDigital Library
- M. Strathern. 2004. Commons and Borderlands: Working Papers on Interdisciplinarity, Accountability and the Flow of Knowledge. Sean Kingston Publishing, Oxford, UK.Google Scholar
- R. H. Stuewer. editor. 1970. Minnesota Studies in the Philosophy of Science, vol. 5, pp. 112–127. University of Minnesota Press, Minneapolis.Google Scholar
- R. Subramanian and T. Haigh. 2013. Starr Roxanne Hiltz: Pioneer digital sociologist. IEEE Ann. Hist. Comput., 35(1): 78–95.Google ScholarDigital Library
- I. Sutherland. 1965. The ultimate display. Proceedings of IFIP Congress, pp. 506–508. DOI: 10.1.1.136.3720.Google Scholar
- I. Sutherland. 1966. Computer graphics: Ten unsolved problems. Datamation, 12(5): 22–27.Google Scholar
- K. Tatarchenko. 2010. Cold War origins of the International Federation for Information Processing. IEEE Ann. Hist. Comput., 32(2): 46–57. DOI: 10.1109/MAHC.2010.8.Google ScholarDigital Library
- K. Tatarchenko. 2011. Informatika ot Silikonovoi Doliny do Zolotoi Doliny. In A. N. Tomilin, editor. SoRuCom–2011 Proceeding, Second International Conference on the History of Computers and Informatics in the Soviet Union and Russian Federation, Veliky Novgorod, pp. 278–282.Google Scholar
- K. Tatarchenko. 2013. 'A house with the window to the West': The Akademgorodok Computer Center, 1958–1993. Ph.D. dissertation, Princeton University.Google Scholar
- O. E. Taulbee and S. D. Conte. 1977. Production and employment of Ph.D.'s in computer science—1976. Commun. ACM, 20(6): 370–372. DOI: 10.1145/359605.359608.Google ScholarDigital Library
- M. Tedre. 2014. The Science of Computing: Shaping a Discipline. Chapman and Hall/CRC, London/New York.Google Scholar
- A. Thackray. 1970. Science: Has its present past a future? In R. H. Stuewer, editor. Historical and Philosophical Perspectives of Science, pp. 112–132. University of Minnesota Press, Minneapolis.Google Scholar
- L. Thurgood, M. J. Golladay, and S. T. Hill. 2006. U.S. Doctorates in the 20th Century. National Science Foundation, Arlington, VA.Google Scholar
- J. Titus. 1967. Security and privacy. Commun. ACM, 10(6): 379–380.Google ScholarDigital Library
- J. P. Titus. 1967. ARPA: A visible means of support (Washington Commentary). Commun. ACM, 10(8): 519–520. DOI: 10.1145/363534.363564.Google ScholarDigital Library
- J. P. Titus. 1967. The patchwork nature of government computing support (Washington Commentary). Commun. ACM, 10(9): 589–592. DOI: 10.1145/363566.363703.Google ScholarDigital Library
- A. B. Tucker and N. E. Gibbs. 1984. On accreditation. Commun. ACM, 27(5): 411–412. DOI: 10.1145/358189.381145.Google ScholarDigital Library
- A. B. Tucker, editor. 1991. Computing curricula 1991. Commun. ACM, 34(6): 68–84. DOI: 10.1145/103701.103710.Google ScholarDigital Library
- R. Turn, E. J. Novotny, J. J. Geraghty, E. H. Sibley, and W. H. Ware. 1982. Observations on the Resilience of the U.S. Information Society. American Federation of Information Processing Societies, Arlington, VA.Google Scholar
- R. Turn. 1975. Security problems in computer communication systems. Comput. Commun. Rev., 5(1): 35–44. DOI: 10.1145/1024847.1024851.Google ScholarDigital Library
- L. Turner. November, 1971. Canadian DPMA Institute formed to deal with domestic problems. Canadian Datasystems, pp. 36–37, 49.Google Scholar
- L. Turner. 1970. Professionalism: Curse or course. CIPS Mag., 1(4): 21.Google Scholar
- A. Van Dam. 1988. Hypertext '87 Keynote Address. Commun. ACM, 31(7): 887–895. DOI: 10.1145/48511.48519.Google ScholarDigital Library
- J. N. Vardalas. 2001. The Computer Revolution in Canada. MIT Press, Cambridge, MA.Google Scholar
- E. J. Vettel. 2004. The protean nature of Stanford University's biological sciences 1946–1972. Hist. Stud. Phys. Biol. Sci., 35(1): 95–113.Google ScholarCross Ref
- D. Walden and T. Van Vleck, editors. 2011. The Compatible Time Sharing System (1961–1973): Fiftieth Anniversary Commemorative Overview. IEEE Computer Society.Google Scholar
- H. M. Walker and C. Kelemen. 2010. Computer science and the liberal arts: A philosophical examination. ACM Trans. Comput. Educ., 10(1): 2:1–2:10. DOI: 10.1145/1731041.1731043.Google ScholarDigital Library
- W. H. Ware. 1959. Soviet computer technology: 1959. RAND Corporation, Santa Monica, RM-2541. DOI: 10.1145/367149.1047530.Google ScholarDigital Library
- W. H. Ware. 1960. Soviet computer technology—1959. Commun. ACM, 3(3): 131–166. DOI: 10.1145/958858.958859.Google ScholarDigital Library
- W. H. Ware. 1967. Security and privacy in computer systems. In Proceedings of the April 18–20, 1967, Spring Joint Computer Conference AFIPS '67, pp. 279–280. ACM Press, New York.Google ScholarDigital Library
- W. H. Ware. 1977. Testimony before the National Commission of Electronic Fund Transfer. Comput. Soc., 8(1): 2–3.Google ScholarDigital Library
- W. H. Ware. 1977. Impact of telecommunications technology on the right to privacy. Comput. Soc., 8(4): 2–5. DOI: 10.1145/958901.958902.Google ScholarDigital Library
- W. H. Ware. 1984. Information systems security and privacy. Commun. ACM, 27(4): 315–321.Google ScholarDigital Library
- W. H. Ware. 2008. RAND and the Information Evolution: A History in Essays and Vignettes. RAND Corporation, Santa Monica.Google Scholar
- M. Warner. 2015. Notes on the evolution of computer security policy in the US government, 1965–2003. IEEE Ann. Hist. Comput., 37(2): 8–18. DOI: 10.1109/MAHC.2015.25.Google ScholarDigital Library
- J. W. Weaver. 1989. ACM Forum: More on regulation. Commun. ACM, 32(11): 1284.Google ScholarDigital Library
- R. Weber and B. Gilchrist. 1975. Discrimination in the employment of women in the computer industry. Commun. ACM, 18(7): 416–418. DOI: 10.1145/360881.360921.Google ScholarDigital Library
- D. Weikle. 2014. Letter from the Editor. ACM SIGCAS Comput. Soc., 44(4): 3.Google Scholar
- F. Weingarten. 1981. Cryptographic research and the computer science community. Commun. ACM, 24(12): 851–853.Google Scholar
- M. Wetherell, S. Taylor, and S. J. Yates. 2001. Discourse as Data: A Guide for Analysis. Sage Publications, London.Google Scholar
- P. Wettersten. 1986. ACM Forum: Further observations on hacking. Commun. ACM, 29(9): 829.Google ScholarDigital Library
- E. Weyuker. 2009. ACM-W celebrates women in computing. Commun. ACM, 52(6): 5. DOI: 10.1145/1516046.1516047.Google ScholarDigital Library
- B. White. 2013. SIGWEB History Project. ACM SIGWEB Newslett., (Spring 2013): 1–5. DOI: 10.1145/2451836.2451837.Google ScholarDigital Library
- S. B. Williams. 1954. The Association for Computing Machinery. J. ACM, 1(1): 1–3. DOI: 10.1145/320764.320765.Google ScholarDigital Library
- J. A. Wills. 1986. ACM Forum: Reported hacking. Commun. ACM, 29(7): 590.Google Scholar
- J. M. Wing. 2006. Computational thinking. Commun. ACM, 49(3): 33–35. DOI: 10.1145/1118178.1118215.Google ScholarDigital Library
- M. Wisnioski. 2012. Engineers for Change: Competing Visions of Technology in 1960s America. MIT Press, Cambridge, MA.Google Scholar
- A. Wright. May 2014. The secret history of hypertext. The Atlantic. Available at http://www.theatlantic.com/technology/archive/2014/05/in-search-of-the-proto-memex/371385/.Google Scholar
- R. Wright and J. A. Jacobs. 1994. Male flight from computer work: A new look at occupational resegregation and ghettoization. Am. Sociolog. Rev., 59(4): 511–536.Google ScholarCross Ref
- M. Wyer, M. Barbercheck, D. Cookmeyer, H. Ozturk, and M. Wayne, editors. 2013. Women, Science, and Technology: A Reader in Feminist Science Studies. Routledge, New York.Google Scholar
- J. R. Yost. 2007. A History of computer security standards. In K. De Leeuw and J. A. Bergstra, editors. The History of Information Security: A Comprehensive Handbook, pp. 595–621. Elsevier, Amsterdam.Google ScholarCross Ref
- J. R. Yost. 2008. From the Editor's desk. IEEE Ann. Hist. Comput., 30(1): 2–3.Google ScholarDigital Library
- J. R. Yost. 2015. The origin and early history of the computer security software products industry. IEEE Ann. Hist. Comput., 37(2): 46–58. DOI: 10.1109/MAHC.2015.21.Google ScholarDigital Library
- M. Young and J. Muller. 2014. Knowledge, Expertise and the Professions. Routledge, London/New York.Google Scholar
- Z. Zeller. 1987. Inventing Canada. University of Toronto Press, Toronto.Google Scholar
- H. Zuckerman, J. R. Cole, and J. T. Bruer, editors. 1992. The Outer Circle: Women in the Scientific Community. Yale University Press, New Haven, CT.Google Scholar
- L. M. Zurk, et al. 1995. When an advantage is not an advantage. Commun. ACM, 38(12): 17–18.Google ScholarDigital Library
Cited By
- Vagts B (2024). Telenet, the 1983 Hacking Incidents, and the Construction of Network Security in the United States, IEEE Annals of the History of Computing, 46:1, (34-47), Online publication date: 1-Jan-2024.
- Tracy K (2021). Software, 10.1145/3477339, Online publication date: 6-Sep-2021.
- Misa T (2021). Dynamics of gender bias in computing, Communications of the ACM, 64:6, (76-83), Online publication date: 1-Jun-2021.