Journal: SIGCAS Computers and Society

Volume 31, Issue 4

3 -- 4Alison E. Adam, Eileen Green. Equal opportunies online: guest editorial
5 -- 14Anne Scott. Grounded politics: some thoughts on feminist process in the information age
15 -- 22Clem Herman. From visions to reality: changing women's perspectives at the village hall
23 -- 32Gill Kirkup. Cyborg teaching
33 -- 40Anna Buehring, Teresa S. Waring. From theory into practice: a feminist perspective on information systems integration and cultural change
41 -- 42Paula Roberts. Hacking Cyberspace
42 -- 43Sheryl N. Hamilton. Virtual Gender: Technology, Consumption and Identity (2001)

Volume 31, Issue 3

5 -- 8A. Rhae Adams. Beyond numbers and demographics: "experience-near" explorations of the digital divide
9 -- 14Susan B. Kretchmer, Rod Carveth. The color of the net: African Americans, race, and cyberspace
15 -- 21Mizuko Ito, Vicki L. O'Day, Annette Adler, Charlotte Linde, Elizabeth D. Mynatt. Making a place for seniors on the Net: SeniorNet, senior identity, and the digital divide
22 -- 31Torin Monahan. The analog divide: technology practices in public education
32 -- 34John M. Artz. Imagination, truth and possible consequentialism
35 -- 0Shrisha Rao. Does society need computer science research?
36 -- 40Alison Adam. Book Reviews: Pornography and the Internet: " The Biggest Dirty Bookshop in History?"
41 -- 42Ira Nayman. Book review: Digital McLuhan: A Guide to Millenium by Paul Levinson
42 -- 43Leslie Shade. Book review: The Digital Divide: Facing a Crisk or Creating a Myth by Benjamin M. Compaine

Volume 31, Issue 2

5 -- 7Richard A. Spinello, Herman T. Tavani. The Internet, ethical values, and conceptual frameworks: an introduction to Cyberethics
8 -- 23Gregory J. Walters. Privacy and security: an ethical analysis
24 -- 29Mikko T. Siponen. Five dimensions of information security awareness
30 -- 36Herman T. Tavani. Cyberethics biliography 2001: a select list of recent works

Volume 31, Issue 1

6 -- 11Herman T. Tavani, James H. Moor. Privacy protection, control of information, and privacy-enhancing technologies
12 -- 16Deborah G. Johnson, Keith W. Miller. The ties that bind: connections, comet cursors, and consent
17 -- 21Ellen A. Rose. Balancing internet marketing needs with consumer concerns: a property rights framework
22 -- 23Enda Brophy. Cyber-Marx: Cycles and Circuits of Struggle in High-Technology Capitalism
23 -- 25Felix Stalder. The Age of Spiritual Machines: When Computers Exceed Human Intelligence
25 -- 26Ana Viseu. Philosophy and computing: An introduction
27 -- 28Joseph S. Fulda. Reputation as property, and its relation to privacy