Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010253300 | QA76.9.C66 C664 2011 f | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Annual Editions is a series of over 65 volumes, each designed to provide convenient, inexpensive access to a wide range of current articles from some of the most respected magazines, newspapers, and journals published today. Annual Editions are updated on a regular basis through a continuous monitoring of over 300 periodical sources. The articles selected are authored by prominent scholars, researchers, and commentators writing for a general audience. The Annual Editions volumes have a number of common organizational features designed to make them particularly useful in the classroom: a general introduction; an annotated table of contents; a topic guide; an annotated listing of selected World Wide Web sites; and a brief overview for each section. Each volume also offers an online Instructor's Resource Guide with testing materials. Using Annual Editions in the Classroom is the general instructor's guide for our popular Annual Editions series and is available in print (0073301906) or online. Visit www.mhcls.com for more details..
Table of Contents
Preface |
Correlation Guide |
Topic Guide |
Internet References |
Unit 1 Introduction |
Unit Overview |
1 Five Things We Need to Know about Technological ChangeNeil Postman, New Tech '98 Conference, March 27, 1998 |
2 Moore's Law and Technological Determinism: Reflections on the History of TechnologyPaul E. Ceruzzi, Technology and Culture, July 2005 |
Unit 2 The Economy |
Unit Overview |
3 Click Fraud: The Dark Side of Online AdvertisingBrian Grow and Ben Elgin, BusinessWeek, October 2, 2006 |
4 Online Salvation?Paul Farhi, American Journalism Review, December 2007/January 2008 |
5 Great Wall of Facebook: The Social Network's Plan to Dominate the Internet-and Keep Google OutFred Vogelstein, Wired, July 2009 |
6 Beyond BlogsStephen Baker and Heather Green, BusinessWeek, June 2, 2008 |
7 Personally Controlled Online Health Data-The Next Big Thing in Medical Care?Robert Steinbrook, MD, The New England Journal of Medicine, April 17, 2008 |
Unit 3 Work and the Workplace |
Unit Overview |
8 National ID: Biometrics Pinned to Social Security CardsRyan Singel, Wired, May 15, 2007 |
9 Dilberts of the World, Unite!David Sirota, The Nation, June 23, 2008 |
10 Computer Software Engineers, Occupational Outlook Handbook, 2006/07 Edition |
11 How Deep Can You Probe?Rita Zeidner, HR Magazine, October 2007 |
12 Privacy, Legislation, and Surveillance SoftwareG. Daryl Nord and Tipton F. McCubbins and Jeretta Horn Nord, Communications of the ACM, August 2006 |
Unit 4 Computers, People, and Social Participation |
Unit Overview |
13 Is Google Making Us Stupid?Nicholas Carr, The Atlantic, July 2008 |
14 The End of SolitudeWilliam Deresiewicz, The Chronicle Review, The Chronicle of Higher Education, January 30, 2009 |
15 Girl PowerChuck Salter, Fast Company, September 2007 |
16 Bloggers against TortureNegar Azimi, The Nation, February 19, 2007 |
17 It's Not Easy to Stand up to Cyberbullies, but We MustRobert M. O'Neil, The Chronicle of Higher Education, July 11, 2008 |
18 The Nike Experiment: How the Shoe Giant Unleashed the Power of Personal MetricsMark McClusky, Wired, July 2009 |
19 Center StageCarl Sessions Stepp, American Journalism Review, April/May 2006 |
20 E-Mail Is for Old PeopleDan Carnevale, The Chronicle of Higher Education, October 6, 2006 |
Unit 5 Societal Institutions: Law, Politics, Education, and the Military |
Unit Overview |
21 The Coming Robot ArmySteve Featherstone, Harper's Magazine, February 2007 |
22 Google & the Future of BooksRobert Darnton, The New York Review of Books, February 12, 2009 |
23 Archiving Writers' Work in the Age of E-MailSteve Kolowich, The Chronicle of Higher Education, April 10, 2009 |
24 Wikipedia in the NewsroomDonna Shaw, American Journalism Review, February/March 2008 |
25 E-Mail in Academia: Expectations, Use, and Instructional ImpactMeredith Weiss and Dana Hanson-Baldauf, Educause Quarterly, Number 1 2008 |
Unit 6 Risk and Avoiding Risk |
Unit Overview |
26 A Growing Watch ListKaren DeYoung, The Washington Post National Weekly Edition, April 2-8, 2007 |
27 The Evolution of Cyber WarfareGreg Bruno, Backgrounder: Council on Foreign Relations, February 27, 2008 |
28 Geeks and Hackers, Uncle Sam's Cyber Force Wants You!William J. Astore, The Nation, June 5, 2008 |
29 Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of FacebookSimson Garfinkel, Technology Review, July/August 2009 |
30 The Software Wars: Why You Can't Understand Your ComputerPaul De Palma, American Scholar, Winter 2005 |
31 False Reporting on the Internet and the Spread of Rumors: Three Case StudiesPaul Hitlin, gnovis, April 26, 2004 |
Unit 7 International Perspectives and Issues |
Unit Overview |
32 China's Tech Generation Finds a New Chairman to VenerateKevin Holden, Wired, May 24, 2007 |
33 New Tech, Old HabitsMoon Ihlwan and Kenji Hall, BusinessWeek, March 26, 2007 |
34 Iran's Twitter Revolution? Maybe Not YetJoel Schectman, BusinessWeek, June 17, 2009 |
35 The List: Look Who's Censoring the Internet NowJoshua Keating, Foreign Policy, March 2009 |
36 Dissent Made Safer: How Anonymity Technology Could Save Free Speech on the InternetDavid Talbot, Technology Review, August 15, 2009 |
Unit 8 The Frontier of Computing |
Unit Overview |
37 A Nascent Robotics Culture: New Complicities for CompanionshipSherry Turkle, AAAI Technical Report, July 2006 |
38 Toward Nature-Inspired ComputingJiming Liu and K. C. Tsui, Communications of the ACM, October 2006 |
39 Google and the Wisdom of CloudsStephen Baker, BusinessWeek, December 24, 2007 |
40 Cloud ComputingBrian Hayes, Communications of the ACM, July 2008 |
41 The Coming SuperbrainJohn Markoff, The New York Times, May 24, 2009 |
Test-Your-Knowledge Form |
Article Rating Form |