Abstract is missing.
- Preface to the Second Edition [doi]
- Heads-Up versus Heads-In Views of Computer SystemsRob Kling. 2-3 [doi]
- A Reader's Guide to Computerization and ControversyRob Kling. 4-9 [doi]
- Social Controversies about ComputerizationRob Kling. 10-15 [doi]
- Computers as Tools and Social Systems: The Car-Computer AnalogyRob Kling. 16-21 [doi]
- The Seductive Equation of Technological Progress with Social ProgressRob Kling. 22-25 [doi]
- Learning about the Possible Futures of Computerization from the Present and the PastRob Kling. 26-31 [doi]
- Information and Computer Scientists as Moral Philosophers and Social AnalystsRob Kling. 32-38 [doi]
- Hopes and Horrors: Technological Utopianism and Anti-Utopianism in Narratives of ComputerizationRob Kling. 40-58 [doi]
- 2001: A Meetings OdysseyRoss Weiland. 59-66 [doi]
- Boom Time on the New FrontierThomas A. Stewart. 67-74 [doi]
- The Electronic Hive: Embrace ItKevin Kelly. 75-78 [doi]
- The Electronic Hive: Refuse ItSven Birkerts. 79-82 [doi]
- Electronic Office: Playpen or PrisonLangdon Winner. 83-84 [doi]
- Computerization Movements and Tales of Technological UtopianismSuzanne Iacono, Rob Kling. 85-105 [doi]
- The Centrality of Organizations in the Computerization of SocietyRob Kling. 108-132 [doi]
- Israel: Of Swords and Software PlowsharesGad Ariav, Seymour E. Goodman. 133-140 [doi]
- Getting the Electronics Just Right: Wells Fargo Is a Case Study in How a Company Can Exploit the Information RevolutionBarnaby J. Feder. 141-147 [doi]
- How Information Technologies Can Transform OrganizationsMichael Scott Morton. 148-160 [doi]
- B of A's Plans for Computer Don't Add UpDouglas Frantz. 161-169 [doi]
- Groupware Goes BoomDavid Kirkpatrick. 170-172 [doi]
- Learning from Notes: Organizational Issues in Groupware ImplementationWanda J. Orlikowski. 173-189 [doi]
- How Much Will a Truly Empowering Technology-Rich Education Cost?Henry Jay Becker. 190-196 [doi]
- Technology Refusal and the Organizational Culture of SchoolsSteven Hodas. 197-218 [doi]
- Great Expectations: PCs and ProductivityMartin Neil Baily. 219-226 [doi]
- Information Technology and the Productivity ChallengePaul Attewell. 227-238 [doi]
- Where Are the Payoffs from Computerization? Technology, Learning, and Organizational ChangeJohn Leslie King. 239-260 [doi]
- Can Computer Science Solve Organizational Problems? The Case for Organizational InformaticsRob Kling, Jonathan P. Allen. 261-276 [doi]
- Computerization at WorkRob Kling. 278-308 [doi]
- Computerization, Office Routines, and Changes in Clerical WorkSuzanne Iacono, Rob Kling. 309-315 [doi]
- The Case of the Omniscient OrganizationGary T. Marx. 316-321 [doi]
- Mr. Edens Profits from Watching His Workers' Every MoveTony Horowitz. 322-325 [doi]
- Interface Development in a Large Organization: An Observational StudySteven E. Poltrock, Jonathan Grudin. 326-347 [doi]
- Groupware in Practice: An Interpretation of Work ExperiencesChristine V. Bullen, John L. Bennett. 348-382 [doi]
- Computing at Work: Empowering Action by Low-Level UsersAndrew Clement. 383-406 [doi]
- Supporting Articulation WorkLucy A. Suchman. 407-423 [doi]
- Social Relationships in Electronic Forums: Hangouts, Salons, Workplaces, and CommunitiesRob Kling. 426-454 [doi]
- Increasing Personal ConnectionsLee Sproull, Sara B. Kiesler. 455-475 [doi]
- Gender and Democracy in Computer-Mediated CommunicationSusan C. Herring. 476-489 [doi]
- Finding a Happy Medium: Explaining the Negative Effects of Electronic Communication on Social Life at WorkM. Lynne Markus. 490-524 [doi]
- They Call It CyberloveMargo Kaufman. 525-532 [doi]
- The Strange Case of the Electronic LoverLindsy Van Gelder. 533-546 [doi]
- Yakety-Yak, Do Talk Back!: PEN, the Nation's First Publicly Funded Electronic Network, Makes a Difference in Santa MonicaJoan Van Tassel. 547-551 [doi]
- Taboo, Consensus, and the Challenge of Democracy in an Electronic ForumJulian Dibbell. 552-568 [doi]
- Applying Library Intellectual Freedom Principles to Public and Academic ComputersCarl M. Kadie. 569-579 [doi]
- The Electronic Journal: What, Whence, and When?Ann Okerson. 580-593 [doi]
- I Heard It through the InternetWalt Crawford. 594-596 [doi]
- Technology, Scholarship, and the Humanities: The Implications of Electronic InformationVartan Gregorian. 597-605 [doi]
- On the Road Again? If Information Highways Are Anything like Interstate Highways - Watch Out!Richard Sclove, Jeffrey Scheuer. 606-612 [doi]
- Information Technologies and the Shifting Balance between Privacy and Social ControlRob Kling. 614-636 [doi]
- Your Personal Information Has Gone PublicDavid F. Linowes. 637-642 [doi]
- The Bill of Rights of the Constitution of the United StatesGerald Murphy. 643-644 [doi]
- Computer Matching Is a Serious Threat to Individual RightsJohn Shattuck. 645-651 [doi]
- The Government Needs Computer Matching to Root Out Waste and FraudRichard P. Kusserow. 652-658 [doi]
- Clipper Chip Will Reinforce PrivacyDorothy E. Denning. 659-663 [doi]
- Wiretapping Bill: Costly and IntrusiveMarc Rotenberg. 664-668 [doi]
- Privacy: How Much Data Do Direct Marketers Really Need?Denison Hatch. 669-678 [doi]
- Direct Marketing Is Not a Significant Privacy ThreatRobert Posch. 679-685 [doi]
- What to Do When They Ask for Your Social Security NumberChris Hibbert. 686-696 [doi]
- Markets and PrivacyKenneth Laudon. 697-726 [doi]
- Information Entrepreneurialism, Information Technologies, and the Continuing Vulnerability of PrivacyRob Kling, Mark S. Ackerman, Jonathan P. Allen. 727-743 [doi]
- Systems Safety, Normal Accidents, and Social VulnerabilityRob Kling. 746-763 [doi]
- RISKS-FORUM Digest ContributionsR. Aminzade, Michael Slavitch. 764-766 [doi]
- Safety-Critical Computing: Hazards, Practices, Standards, and RegulationJonathan Jacky. 767-792 [doi]
- Aging AirwaysGary Stix. 793-809 [doi]
- Limits of Correctness in ComputersBrian Cantwell Smith. 810-825 [doi]
- Caught in the Grip of RSI: A Firsthand AccountEvan Williamson. 826-829 [doi]
- Office Automation's Threat to Health and Productivity: A New Management ConcernE. M. Omar Khalil, Jessie E. Melcher. 830-837 [doi]
- Computer Emergency Response Team: Ongoing Network Monitoring Attacks: CERT Advisory, February 3, 1994838-843 [doi]
- Risks of TechnologyPeter G. Neumann. 844-846 [doi]
- Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science ProfessionalsRob Kling. 848-869 [doi]
- All in a Day's Work: Nine Provocative Examples in the Practice of Computing ProfessionalsDonn B. Parker, Susan Swope, Bruce N. Baker, Eric A. Weiss. 870-875 [doi]
- Codes of Professional EthicsRonald E. Anderson, Deborah G. Johnson, Donald Gotterbarn, Judith A. Perrolle. 876-877 [doi]
- Confronting Ethical Issues of Systems Design in a Web of Social RelationshipsIna Wagner. 889-902 [doi]
- Power in Systems DesignBo Dahlbom, Lars Mathiassen. 903-906 [doi]
- Considering Privacy in the Development of Multimedia CommunicationsAndrew Clement. 907-931 [doi]
- New Principles for Engineering EthicsEdward Wenk. 932-944 [doi]