Resources

  1. 3 cyber mercenaries: An insider threat case study

    Article This article tells the story of three US nationals who assisted the United Arab Emirates in exploiting Apple's operating system and...

  2. 6 Links That Will Show You What Google Knows About You

    Article In this article, there are 6 links featured that, when clicked, give you a peek into the data Google has...

  3. ACM Code of Ethics and Professional Conduct

    Other This code of ethics put forth by the Association for Computing Machinery seeks to guide the ethical conduct of computing professionals.

  4. Action versus Contemplation

    Book The description for this book is as follows: "'All of humanity’s problems stem from man’s inability to sit quietly in a room alone,' Blaise...

  5. Adblocking: How About Nah?

    Article In this article, the author discusses the ethics of using an ad blocker, and highlighting the position that ad blockers give users...

  6. Advanced Network Reconnaissance with Nmap

    Video This video is a presentation by Gordoon Lyon aka Fydor, the creator of the nmap network scanner, from ShmooCon 2006. From...

  7. Advertising is a cancer on society

    Article In this article, the author argues that modern advertising is similar to how cancer takes over the human body. After...

  8. A face-scanning algorithm increasingly decides whether you deserve the job

    Article This article discusses HireVue, a technology that uses artificial intelligence to analyze job candidates. The article discusses both favorable and unfavorable...

  9. A Framework for Making Ethical Decisions

    Article In this article, from Brown University's Science and Technology Studies department, the author provides an introduction to making ethical decisions....

  10. After Modernity: Archaeological Approaches to the Contemporary Past

    Book The introduction to this book provides access to the debate on the "archeology of the contemporary" or, in other terms, the archeology of...

  11. After Working at Google, I'll Never Let Myself Love a Job Again

    Article In this article, Emi Nietfeld describes what happened to her at Google, a company she once loved. 

  12. A horrifying new AI app swaps women into porn videos with a click

    Article This article describes a website that creates pornography deepfakes. A deepfake is hyper-realistic fake audio or video content depicting something...

  13. AI emotion-detection software tested on Uyghurs

    Article This article describes how a Chinese software company tested their emotion recognition software on the Uyghurs, a marginalized ethnic group in...

  14. AI-Generated Art Scene Explodes as Hackers Create Groundbreaking New Tools

    Article This article describes how hackers combined different open source AI tools to create a visual art generator that creates an...

  15. AI is increasingly being used to identify emotions – here’s what’s at stake

    Article This article discusses some of the issues with Emotion Recognition Technology (ERT). ERT stands on shaky scientific ground and is prone...

  16. Airbnb Was Like a Family, Until the Layoffs Started

    Article In this article, Erin Griffith depicts the conflict that occurred when Airbnb's company culture faced the realities of the global...

  17. Alexa, Should We Trust You?

    Article This article discusses the potential of voice assistants like Alexa, Siri, and Google Assistant to change our society. A big...

  18. All Tesla Cars Being Produced Now Have Full Self-Driving Hardware

    Article This 2016 blog post from Tesla's blog describes how all Tesla cars being produced from that point onward have full self-driving...

  19. Amazon cloud sputters for hours, and a boatload of websites go offline

    Article In this article, Brodkin reports on the IoT devices that went down during Amazon S3 outage.

  20. American Spies: how we got to mass surveillance without even trying

    Article This article is a book review of American Spies by Jennifer Stisa Granick. It describes the legal complications surrounding Internet privacy in the United...

  21. American Time Use Survey

    Report Summary: In this report, the US Bureau of Labor Statistics details how Americans spend their time. There are many data...

  22. A Message To Our Customers

    Article This letter from Apple to its customers explains why Apple refused to comply with the FBI's request for a "backdoor" to...

  23. An anonymous response to dangerous FOSS Codes of Conduct

    Article In this article, an anonymous writer pens a response to what he believes are Dangerous FOSS Codes of Conduct. He argues the...

  24. Andrew Yang Is Full of It

    Article In this article, the author pushes back against Andrew Yang's dystopian warnings about automation and mass unemployment that have motivated...

  25. An Evening with Berferd: In Which a Cracker is Lured, Endured, and Studied

    Article This article is written by Bell Labs researcher Bill Cheswick about Unix security. Cheswick studied a hacker in the wild using an early...

  26. A New Harassment Policy for Twitter

    Article This article describes Twitter's 2014 response to targeted harassment on their site. This response included an easier way for users to manage...

  27. An Oral History of the L0pht

    Article This series of articles is an oral history of one of the more influential hacker groups, the Boston-based hacker group,...

  28. A Novice's Guide to Hacking- 1989 edition

    Article This article is a classic piece of self-directed training in hacking by a hacker with the handle The Mentor from the...

  29. A Philosopher Looks at Work

    Book The description for this book is as follows:  "Is work as we know it disappearing? And if so why should we...

  30. A philosopher’s view: the benefits and dignity of work

    Article In this article,    Image Credit: Rafael Cavalcante/Flickr

  31. Apple, Facebook, Google, Amazon Top Interviewer Reveals Secrets of Landing Dream Job

    Article In this article, one of Silicon Valley's top interviewers tells all about how to win a highly coveted job at the...

  32. Apple, Google will pay 64,000 engineers to avoid trial on “no-poach” deal

    Article  In this article, Joe Mullin talks about a class-action lawsuit against Google, Apple, Adobe, and Intel over how they recruited employees which was...

  33. Apple I

    Digital Artifact This article details the technical development and contextual history of the Apple I, originally released under the name Apple Computer. This...

  34. A Preface To Economic Democracy

    Book In this book, Dahl explores the notions of liberty and equality, and argues that, contrary to Tocqueville's claim, the two...

  35. A Prehistory of Social Media

    Article This article provides an introduction to the birth of social media by providing a "prehistory" of the internet itself. The article focuses...

  36. A Radical Cure: Hannah Arendt & Simone Weil on the Need for Roots

    Article In this article, Remer draws on the philosophies of Hannah Arendt and Simone Weil to argue that the modern world...

  37. Archaeology of Hacking: Textfiles Explainer

    Video This video an overview of the hacker underground media sharing platform known as textfiles. 

  38. Are Hacker Break-Ins Ethical?

    Article From the article description: Eugene H. Spafford argues that we should judge the actions of hackers, not the rationalizations they...

  39. Are These the Hidden Deepfakes in the Anthony Bourdain Movie?

    Article This article describes the controversy surrounding the use of deepfake audio clips in Roadrunner, a documentary about Anthony Bourdain made after his...

  40. Aristotle and Aquinas on the Active and Contemplative Life

    Video In this video, Rev. John I. Jenkins, C.S.C., President of the University of Notre Dame, and Dr. Meghan Sullivan (Rev. John...

  41. Aristotle: In Praise of Contemplation

    Article In this article, the author explains Aristotle's belief that a good life is committed to contemplation. Barrientos shows that Aristotle...

  42. Aristotle & Virtue Theory: Crash Course Philosophy #38

    Video From the video description: "This week we explore final ethical theory in this unit: Aristotle’s virtue theory. Hank explains the...

  43. As Cameras Track Detroit’s Residents, a Debate Ensues Over Racial Bias

    Article This article discusses the city of Detroit’s “Project Green Light” initiative which uses facial recognition surveillance to find criminals. Some...

  44. Ask HN: How much do you make at Amazon?

    Other In this forum, software engineers share how much they make at Amazon.

  45. Ask HN: How much do you make at Google?

    Other In this forum, software engineers share how much they make at google.

  46. A Stoic Guide To Workplace Peace Of Mind

    Other In this article, the author gives practical advice, backed by famous stoic philosophers, for how to find peace of mind...

  47. Attack of the Anons Lecture Slides

    Lecture / slides Slides for Lecture 13 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The learning goals...

  48. Authentic Happiness

    Book The description for this book is as follows: "According to esteemed psychologist and bestselling author Martin Seligman, happiness is not...

  49. Automatic Discovery of Meme Genres with Diverse Appearances

    Academic Paper This academic paper has the following abstract: Forms of human communication are not static — we expect some evolution in...

  50. A Vulnerable Internet Lecture Slides

    Lecture / slides Slides for Lecture 24 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The learning goals for...

  51. Back Orifice

    Digital Artifact This article details the digital artifact Back Orifice (a play on Windows Back Office) created by the hacking group Cult of the...

  52. Barr says the US needs encryption backdoors to prevent “going dark.” Um, what?

    Article This article discusses a 2019 keynote address by Attorney General William Barr in which he argued that information security "should not...

  53. BBS The Documentary: Episode 1 of 8: BAUD (The Beginning)

    Video This video is episode 1 of 8 of a documentary mini-series by Jason Scott about the bulletin board systems (BBS). From...

  54. Being More Educated May not Make you More Satisfied with Your Job, Study Finds

    Article In this article, it presents some interesting findings about education and job satisfaction. It finds, that you might wind up...

  55. Being rich wrecks your soul. We used to know that.

    Article In this article, the authors use psychology and philosophy to argue that being wealthy is not healthy or good for...

  56. Benedictine­ College Raises the Bar in Fight Against Porn Addiction

    Article This article describes Benedictine College’s efforts to discourage pornography viewing on campus. Not only did the Catholic college block pornography...

  57. Bernard Williams Thought Experiment (Clip from "Utilitarianism: Crash Course")

    Video In this video, Crash Course explains the basics of utilitarian philosophy, which is centered around the idea that the morally...

  58. Better, Stronger, Faster

    Other This text file from the Cult of the Dead Cow describes the NBC Dateline episode that featured the mysterious hacker "Quentin"...

  59. Big Data Business Plan Lecture Slides

    Lecture / slides In these lecture slides for the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department, the following...

  60. Blaschko on the Active vs Contemplative Work Life

    Video In this video, Paul Blaschko looks at how thinking about our work lives in terms of the "active vs. contemplative" debate...

  61. Boeing Employee Fired for Discussing Computer Security Problems at Company

    Article This article tells the story of how Boeing fired an employee for speaking to the Seattle Post-Intelligencer about security issues at...

  62. Book Launch: The Hacker and the State

    Video This video is the book launch of Dr. Ben Buchanan's book The Hacker and the State. From the video description, "Packed with...

  63. Bradley Manning’s Army of One

    Article This article tells the story of Chelsea Manning (formerly Bradley Manning). The article tells Manning's life story and how that led...

  64. Bridges, Software Engineering, and God

    Article In this article, the author describes why software engineering is different from other forms of engineering. The author claims that...

  65. Buffer Overflow Exploit

    Digital Artifact This article describes the digital artifact of a buffer overflow exploit. A buffer overflow is an anomaly where a program writes...

  66. Building A Better Future Lecture Slides

    Lecture / slides Slides for Lecture 26 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The learning goals for...

  67. Bullshit Jobs: A Theory

    Book In this book, anthropologist David Graeber argues that millions of people today find themselves in jobs that contribute nothing of...

  68. Cancel Culture Lecture Slides

    Lecture / slides Slides for Lecture 17 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The learning goals...

  69. Capital One Data Breach Compromises Data of Over 100 Million

    Article This article sheds light on a 2019 data breach of data from Capital One bank. The article explains how the suspect,...

  70. Car makers can’t “drive their way to safety” with self-driving cars

    Article In this article, the author argues that while autonomous vehicles are being promoted in the name of road safety, it...

  71. Catholic Officials on Edge After Reports of Priests Using Grindr

    Article This article describes the reports of Catholic clergy using the hookup app Grindr by the conservative Catholic blog The Pillar. Editors...

  72. Catholic Social Teaching in 3 Minutes

    Video In this video, Trócaire explains the basics of Catholic Social Teaching (CST). The central tenets of CST are:  Respect for Human Life...

  73. Cesare Lombroso

    Academic Paper This academic paper has the following abstract: The Italian physician Cesare Lombroso, one of the first scientific criminologists and a forensic psychiatrist,...

  74. Changes to Facebook’s "Real Names" Policy Still Don’t Fix the Problem

    Article In this article, the authors discuss changes Facebook made to its "real names policy." The real names policy required Facebook users...

  75. Change the World, cDc Style

    Video This video is from the DefCon 27 Conference and is a presentation by the hacking group Cult of the Dead Cow. This...

  76. Chapter 1 - Engineering Ethics

    Book This  book is an introductory textbook that explores many of the ethical issues that a practicing engineer might encounter in the...

  77. China Presses Its Internet Censorship Efforts Across the Globe

    Article This article describes the great lengths China goes to in order to censor anti-China content online. While it is well-known that...

  78. China says terrorism, fake news impel greater global internet curbs

    Article This article describes how China used terrorism and fake news threats as reasons to tighten their national Internet censorship. China likened...

  79. China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall

    Article This article describes the ways China is able to influence Internet censorship not just domestically but also worldwide. China is able...

  80. Cities Have Taken the Lead in Regulating Driverless Vehicles

    Article This article describes how cities, rather than federal or state governments, have taken the lead on autonomous vehicle regulation. The article...

  81. Cities Need to Take the Wheel in Our Driverless Future

    Article In this article, the author argues that cities need to play an active and thoughtful role in regulating the introduction...

  82. Clearview AI finally takes part in a federal accuracy test

    Article This article describes how the controversial facial recognition algorithm from Clearview AI was put to a third party test for...

  83. Coding Freedom: The Ethics and Aesthetics of Hacking

    Book This book was written by scholar Gabriella Coleman about the ethics and history of the hacking community. The particular chapter read...

  84. Companies Say Trump is Hurting Business By Limiting Legal Immigration

    Article This article explores some of the downsides of limiting legal immigration. The article profiles business owners and managers in a variety...

  85. Computer security faults put Boeing at risk

    Article This article is the article through which a Boeing whistleblower exposed Boeing's internal security risks. Through interviewing Boeing employees and reviewing...

  86. CONFidence 2021: The Coming AI Hackers

    Video This video is from CONfidence 2021 from Bruce Schneier discussing the future of hacking. From the video description, "Hacking is a human endeavor,...

  87. Consolidation in the Internet Economy

    Article In this article, answer "How will consolidation impact the Internet’s technical evolution and use?"

  88. Contributor Covenant

    Other This code of ethics outlines standards of behavior for people contributing to open source projects and participating in open source communities.

  89. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

    Book This book describes the details of the history and technological development of the Stuxnet Worm. Kim Zetter is a top cybersecurity journalist...

  90. Counterproductive: Time Management in the Knowledge Economy

    Book In this book, Melissa Gregg argues that the emphasis on productivity as the ultimate measure of job performance is a...

  91. Credit reporting firm Equifax says data breach could potentially affect 143 million US consumers

    Article This article describes a 2017 data breach affecting Equifax, a company providing credit information. The breach potentially affected 143 million consumers...

  92. Crypto

    Book Chapter This book chapter is from Steven Levy's book "Crypto" which tells the stories of key figures behind cryptography and the cypherpunk movement. This...

  93. Cult of the Dead Cow

    Book Chapter This book chapter from the recent book on the hacking group the Cult of the Dead Cow is about the Back Orifice...

  94. Cyberbullying in the workplace: 'I became paranoid'

    Article In this article, two instances of workplace cyberbullying are profiled. The article notes that the blurred line between work life...

  95. Cyberbullying: what it is and how to avoid it

    Article This article on cyberbullying describes what it is, its effects, how parents can talk about cyberbullying with their children, and practical tips...

  96. Darknet Diaries Ep: 45 Xbox Underground

    Video This video details one of the biggest hacks on the Xbox gaming console. From the video description, "It started as a...

  97. Dateline on Computer Hacking

    Video In this NBC Dateline episode from 1992, the hosts expose how hackers are easily able to break into the computer systems...

  98. David Foster Wallace discusses Consumerism

    Video In this video, David Foster Wallace discusses the dangers of consumerism and teaching individualistic self-gratification to children. He argues that...

  99. Dear Silicon Valley: America’s fallen out of love with you

    Article In this article, the author tells Silicon Valley that America has fallen out of love with it. The author lists...

  100. Deepfakes Are Now Making Business Pitches

    Article This article describes how deepfakes--hyper-realistic fake videos--are making their way into the business world. Specifically, the article profiles how EY uses...

  101. Deepfake satellite imagery poses a not-so-distant threat, warn geographers

    Article This article describes the threat of geographic deepfakes. Most people think of deepfakes as hyper-realistic fake videos of people saying...

  102. Deepfakes in cyberattacks aren’t coming. They’re already here.

    Article This article outlines some of the concerns about deepfakes—hyper-realistic fake videos created with artificial intelligence. The concerns listed in the...

  103. Deep Work

    Book The description for this book is as follows: "Deep work is the ability to focus without distraction on a cognitively...

  104. DEF CON 19 - Jason Scott - Archive Team: A Distributed Preservation of Service Attack

    Video This video depicts a presentation by Jason Scott at the hacker conference, DEFCON '19 about the preservation of digital artifacts on...

  105. DEFCON - The Full Documentary

    Video This video is a documentary of the DefCon hacker conference and hacking convention. From the video description, "A film about the world's...

  106. Defund Facial Recognition

    Article This article describes how facial recognition in policing is a particular threat to Black lives and to democracy. The article...

  107. Designed to Deceive: Do These People Look Real to You?

    Article This article describes how machine learning algorithms (specifically Generative Adversarial Networks or GANs) are able to create incredibly realistic-looking human...

  108. Dialectic of Enlightenment

    The description for this book is as follows: "Dialectic of Enlightenment is undoubtedly the most influential publication of the Frankfurt School...

  109. Dialogue Group 1

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  110. Dialogue Group 10

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  111. Dialogue Group 11

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  112. Dialogue Group 2

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  113. Dialogue Group 3

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  114. Dialogue Group 4

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  115. Dialogue Group 5

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  116. Dialogue Group 6

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  117. Dialogue Group 7

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  118. Dialogue Group 8

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  119. Dialogue Group 9

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  120. Dialogue Group Meeting 0

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  121. Dialogue Training Manual

    Dialogue Group In everyday life, a “dialogue” is any conversation in which all participants share perspectives on a question or idea and...

  122. Digital Archaeology: Rescuing Neglected and Damaged Data Resources

    Academic Paper This article from the University of Glasgow is a handy guide for historical preservation in the 1990s that makes use of...

  123. Digital Equipment Corporation PDP-11

    Digital Artifact This article details the history and technical developments of the PDP-11, a series of 16-bit microcomputers sold by Digital Equipment Corporation...

  124. Disinformation

    Video In this video from the 1990s, members of the hacking group the Cult of the Dead Cow comment on where they...

  125. Don't Give Silicon Valley More H1B Visas

    Article In this article, the author argues again giving Silicon Valley more H1B Visas. The author argues that the H1B Visa...

  126. Drive

    Book The description for this book is as follows: "Most people believe that the best way to motivate is with rewards...

  127. Ecclesiastes Chapter 1 (from the Bible)

    Poem In the opening chapter of Ecclesiastes, a speaker who identifies themself as a preacher and king of Jerusalem proclaim a deeply nihilistic...

  128. Economic Inequality

    Article In this article, Graham sheds light on the roots of economic inequality. 

  129. Edmonton gore site owner charged in Magnotta video investigation released on bail

    Article This article describes the legal action taken towards Mark Marek, the owner of the website bestgore.com that hosted a video...

  130. Edward Snowden, the media, and the Espionage Act

    Article In this article, the author argues that Edward Snowden should not be pardoned. The author argues that Snowden's intention was...

  131. Emotion AI researchers say overblown claims give their work a bad name

    Article This article discusses emotion recognition, the technology used by HireVue to screen job candidates using artificial intelligence. The article discusses the limitations...

  132. Employees Who Stay In Companies Longer Than Two Years Get Paid 50% Less

    Article In this article, Cameron Keng provides evidence that staying employed at the same company for over two years on average is...

  133. Engineers Are Leaving Trump’s America for the Canadian Dream

    Article This article highlights the stories of former United States H-1B workers who moved to Canada because of its more welcoming immigration policy. It...

  134. Ethical and Professional Issues Trailer

    Video From the video description: "Prof. Walter Scheirer (Computer Science, University of Notre Dame) introduces his new course, 'Ethical and Professional...

  135. Ethical Decision Making

    Video In this video, you are asked to think about the last time you made a big decision. Why did you...

  136. Ethics and the Second Law of Thermodynamics

    Article In this article, the author discusses the reality that many engineers who have gotten into trouble because of ethical violations...

  137. Ethics Defined: Integrity

    Video In this video, the McCombs School of Business looks to define integrity. Integrity is an essential moral virtue that is the...

  138. Ethics in the Conflicts of Modernity

    Book The description for this book is as follows: "Alasdair MacIntyre explores some central philosophical, political and moral claims of modernity...

  139. Europe Wants to Ban Facial Recognition—Take Note, America

    Article This article discusses how the European Parliament has called on EU lawmakers to ban biometric surveillance in public spaces. Members...

  140. 'Every smile you fake' — an AI emotion-recognition system can assess how 'happy' China's workers are in the office

    Article In this article, a Chinese emotion recognition system is described. The developers of this technology claim that their system can...

  141. “Everything as a service” is coming—but we’re not there quite yet

    Article This article discusses some of the challenges in moving towards cloud computing as a service. One issue mentioned is privacy and...

  142. Everything is GamerGate

    Article This compilation of reflections places the GamerGate campaign in context with other current events. GamerGate was an online harassment campaign targeted initially at...

  143. Excellence in opera or saving a life? Your choice.

    Article In this article, Peter Singer questions where one ought to direct their charitable donations. For example, does donating to prevent...

  144. Exclusive: Here's The Full 10-Page Anti-Diversity Screed Circulating Internally at Google

    Article In this article, a now infamous memo from a male Google employee (James Damore), titled “Google’s Ideological Echo Chamber,”, is...

  145. Existentialism: Crash Course Philosophy #16

    Video In this video, Crash Course covers the philosophical idea of essentialism and its response – existentialism. The video then discusses...

  146. Existentialism Is a Humanism

    The description for this book is as follows: "It was to correct common misconceptions about his thought that Jean-Paul Sartre,...

  147. Existentialist Praxis Beyond Marxist Idealism, or: How Can Sartre Help Us Today?

    Article In this blog post in Columbia Law's Critique, Ringleb argues that Sartre's notion of seriality, or the formation of in-groups based...

  148. Exploding the Phone

    Book This book provides an in-depth historical perspective and study of phone phreaking and hackers of the telecommunication industry known as phone...

  149. Facebook And Our Phones May Be Wreaking Havoc On Our Morality - Vox

    Article Digital distractions such as social media and smartphones wreak havoc on our attention spans. Could they also be making us...

  150. Facebook, Google and Netflix pay a higher median salary than Exxon, Goldman Sachs or Verizon

    Article In this article, the author discusses how employees at several major tech corporations make more than their counterparts in major business/banking corporations....

  151. Facebook Knew I Was Gay Before My Family Did

    Article This article tells the story of a closeted gay Facebook user who received targeted ads offering assistance with coming out. The...

  152. Facebook Knows Instagram Is Toxic for Teen Girls, Company Documents Show

    Article In this article, take a look at Facebook's own in-depth research which shows a significant teen mental-health issue. Thus far, Facebook has...

  153. Facebook scientists say they can now tell where deepfakes have come from

    Article This article describes deepfake detection software created by Facebook and Michigan State. The software is able to determine not only...

  154. Facebook Tried to Make Its Platform a Healthier Place. It Got Angrier Instead.

    Article In this article, the authors discuss Facebook's internal memos which show how a big 2018 change rewarded outrage and how CEO...

  155. Face-Off Lecture Slides

    Lecture / slides Slides for Lecture 21 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The learning goals...

  156. FACT CHECK: Do Robots Or Trade Threaten American Workers More?

    Article This article fact checks claims made by Elizabeth Warren and Andrew Yang in a 2019 Democratic presidential debate regarding if...

  157. Feds defend voluntary robot car regulations

    Article This article describes the arguments for and against robot car regulations. While safety advocates argue for strict autonomous vehicle regulations, the...

  158. Florida State Student Faces Felony Charges for Redirecting School's Wifi Users to Infamous Shock Site

    Article This article tells the story of a Florida State student who faced felony charges after hacking the school’s wifi network...

  159. Flow: The Psychology of Optimal Experience

    The description for this book is as follows: "Legendary psychologist Mihaly Csikszentmihalyi's famous investigations of 'optimal experience' have revealed that...

  160. Forced to Love the Grind

    Article In this article, Miya Tokumitsu argues that the modern workplace pressures workers to "love to grind," a trend which is both counterproductive...

  161. Forging Pathways to Purposeful Work: The Role of Higher Education

    Report This report conducted jointly by Bates College and the Gallup organization highlights the importance of meaning and purpose for today's...

  162. For Young Female Coders, Internship Interviews Can Be Toxic

    Article In this article, it discusses a survey conducted by Girls Who Code where teen female engineers report that even their very...

  163. Freedom Downtime

    Video This video is the documentary from 2001 that is sympathetic to convicted computer hacker, Kevin Mitnick. It is produced by 2600...

  164. From Anon to Alt-Right: The Dangerous Tricksters of 4chan

    Article In this article, Joanne McNeil outlines how 4Chan's activist arm "Anon" moved evolved from genuine, albeit avant-garde, activism to a breeding...

  165. From driverless dilemmas to more practical commonsense tests for automated vehicles

    Academic Paper This academic paper has the following abstract: "For the first time in history, automated vehicles (AVs) are being deployed in...

  166. From Internet Farming to Weapons of the Geek

    Article This article details the history of political hacking by Gabriella Coleman in which she provides an introduction and inventory of the...

  167. From Memes to Infowars: How 75 Fascist Activists Were “Red-Pilled”

    Article This article describes the "red-pilling" phenomenon--how people with mainstream beliefs are converted to far-right fascist ways of thinking. Specifically, this article...

  168. Fueling the Hong Kong Protests: A World of Pop-Culture Memes

    Article This article describes the pop culture memes employed by anti-government protestors in Hong Kong in 2019. The memes come from...

  169. Future of Travel Lecture Slides

    Lecture / slides Slides for Lecture 19 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. In this lecture, the...

  170. GamerGate's Archvillain Is Really A Trolling Sketch Comedian

    Article This article tells the story of Jan Rankowski, an Internet satiritst and comedian. Rankowski experienced harassment after he posted a video satirizing "GamerGaters"...

  171. Give Up On Work-Life Balance

    Article In this article, Olga Khazan argues that the best way to stay sane while managing work and life is to...

  172. Gmail and other popular Google services experienced a partial service outage at a very bad time

    Article In this article, Oreskovic reports on some of Google's most popular services, including Gmail and Google Calendar, that experienced technical...

  173. GNU General Public License, v.2

    Digital Artifact This digital artifact is a well known legal hack also known as a "copyleft" (a play on copyrights). The GNU Public License,...

  174. God's Grandeur

    Poem In this poem, Hopkins proclaims God's presence in the natural world, and bemoans humankind's severed connection to it. He laments...

  175. Good Work

    Book The description for this book is as follows: "What does it mean to carry out "good work"? What strategies allow...

  176. Google Employee Alleges Discrimination Against Pregnant Women in Viral Memo

    Article In this article, the authors discuss a memo written by a Google employee who was discriminated against for being pregnant,...

  177. Google Employee Writes Memo About ‘The Burden of Being Black at Google’

    Article In this article, a memo from a former Google employee is discussed. In the memo, the ex-employee criticized the internet...

  178. Google Plus Finally Gives Up on Its Ineffective, Dangerous Real-Name Policy

    Article This article celebrates Google Plus's riddance of a policy that required users to use their real names with their Google Plus...

  179. Group claims to hack NSA-tied hackers, posts exploits as proof

    Article This article tells the story of a hacking group called the Shadow Brokers that claimed to have hacked the NSA's hacking...

  180. Group Project 00: Your Upcoming Career in Tech

    Group Project In this group project, students in the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department...

  181. Group Project 01: The Social Media Situation

    Group Project In this group project, students in the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department are...

  182. Group Project 02: A Letter to the Editor from Citizens Concerned About AI

    Group Project In this group project, students in the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department are...

  183. Group Project 03: A Visual Guide to Security and Privacy

    Group Project In this group project, students in the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department are...

  184. Guardian of the GPL: Online advertising is becoming “a perfect despotism”

    Article In this article, the author provides an overview of Eben Moglen (Guardian of the GPL)' s thoughts on why online...

  185. H-1B: Foreign citizens make up nearly three-quarters of Silicon Valley tech workforce, report says

    Article In this article, Ethan Baron reports on the reality that a majority of Silicon Valley and Seattle-area tech workers are...

  186. H2K2: The Conscience of a Hacker

    Video This video is of the hacker who goes by the handle The Mentor reading his famous essay from 1986, titled "The...

  187. Hacker Activism of the Guacamaya

    Video This video is by the international environmental hacking group known as the Guacamaya. The group has published anonymous reports and leaked sensitive files...

  188. Hacker Crackdown: Law and Disorder on the Electronic Frontier

    Book Chapter This book details the spirit of the times with the criminalization (and eventual crackdown) of the so-called "hacker underground." This particular...

  189. Hacker Documentary: Unauthorized Access by Annaliza Savage [1994]

    Video This video has the following YouTube description: This is a nostalgic hacker documentary about the early to mid 90s computer...

  190. Hackers and Painters

    Article In this essay, Dr. Graham addresses creativity, time, and success in technology.

  191. Hackers: Heroes of the Computer Revolution

    Book Steven Levy's book is is a classic text on the history of computing. It is used throughout the course to highlight the hacker...

  192. Hacker Space Design Patterns

    Lecture / slides This document is a set of slides from Jens Ohlig and Lars Weiler for the 24th Chaos Communication Congress about Building a...

  193. Hackers Testimony at the United States Senate

    Video This video depicts the testimony of the hacker group, L0pht Heavy Industries, in front of the United States Senate in 1998. The...

  194. Hackers - Wizards of the Electronic Age

    Video This video is a short documentary about the hacker underground and the foundations of the hacker ethic. From the video description,...

  195. Hacking at the Crossroad: U.S. Military Funding of Hackerspaces

    Article This article is an influential piece written by the inventor Mitch Altman about the influence of defense funding in technological development. It...

  196. Hacking Security

    Article In this article, the authors argue that today's security issues are not information security threats, but rather "abuse." Abuse is...

  197. Have Autonomous Vehicles Hit A Roadblock?

    Article This article argues that despite promises to have fully autonomous vehicles hit the roads around 2021-2022, the reality is that they...

  198. Have Better Days With Marcus Aurelius' Daily Routine | Ryan Holiday on Practicing Stoicism

    Video In this video, Ryan Holiday explores some of Marcus Aurelius' tips for living a better life. He explains how Aurelius...

  199. Hegel & Labour

    Other In this talk by Paul Ashton, he lays out Hegel's view of labor and it application to today. Hegel, according...

  200. Here Comes The Robot Revolution Lecture Slides

    Lecture / slides Slides for Lecture 18 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. In this lecture, the...

  201. Here's How Google Makes Sure It (Almost) Never Goes Down

    Article In this article, take a look at a new book that peers into the system that keeps Google up and...

  202. Hiring is Broken And Yours Is Too

    Article In this article, Prabhakar discusses various interview practices and why "everyone’s hiring practices are broken".

  203. History of Gnu, Linux, Free and Open Software

    Video This video depicts the history of the open source and free software movements including the history and technological development of Gnu and...

  204. HoHoCon 1992 Miscellany

    Article This text file describes how "Project Green Cheese" came up at HoHoCon 1992. For context, this text file should be considered...

  205. How Artificial Intelligence and Robots Will Radically Transform the Economy

    Article This article discusses how automating away jobs isn’t always a bad thing. The article begins with the example of automated...

  206. How bosses are (literally) like dictators

    In this article, Elizabeth Anderson argues that businesses are a form of government, and that workplaces are predominantly spaces of...

  207. How China uses facial recognition to control human behavior

    Article This article describes China’s extreme usage of facial recognition surveillance. While in the US facial recognition surveillance is used to...

  208. How Companies Learn Your Secrets

    Article In this article, the author tells the story of how Target learned to identify when women are pregnant to target...

  209. How Computer Science at CMU Is Attracting and Retaining Women

    Article In this article, it discusses how CMU has attracted a higher rate of women in its computer science program than...

  210. How Congress Censored the Internet

    Article This article discusses the Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) that undermines Section 230 to make...

  211. How Dangerous is Cyberbullying?

    Article In this article, George Beall describes the current state of cyberbullying. The article includes who is being cyberbullied, motivations for cyberbullying,...

  212. How Facebook Hobbled Mark Zuckerberg’s Bid to Get America Vaccinated

    Article In this article from the Wall Street Journal's Facebook Files, the authors describe how despite Facebook's best efforts to promote true...

  213. How Facial Recognition Is Fighting Child Sex Trafficking

    Article This article discusses how facial recognition technology is being used to fight child sex trafficking. The Spotlight tool matches faces...

  214. How Facial Recognition Technology Is Helping Identify the U.S. Capitol Attackers

    Article This article describes how facial recognition technology was used to identify people who participated in the January 6, 2021 attacks...

  215. How Far Did Plato And Xenophon Support The Division Of Labour?

    Article In this article, Sena Özyapı discusses the ancient roots of Adam Smith's idea of division of labor. She focuses on two...

  216. How goatse.cx went from shock site to webmail service

    Article This article tells the story of the website goatse.cx. Originally a shock site with an awful image, the domain was purchased...

  217. How Hackers Broke Into Real News Sites to Plant Fake Stories

    Article This article describes how a hacking group targeted Eastern European countries with disinformation campaigns. Their strategy was to hack the content...

  218. How Jair Bolsonaro used ‘fake news’ to win power

    Article This article tells the story of how Jair Bolsonaro was elected president of Brazil in 2018. His campaign strategy involved the...

  219. How Life Became an Endless, Terrible Competition

    Article In this article, talks about the costs of the meritocracy. Meritocracy prizes achievement above all else, making everyone—even the rich—miserable. The...

  220. How Millennials Became The Burnout Generation

    Article In this article, Peterson explains how the stereotypes commonly associated with millennials - lazy, entitled, spoiled - can mostly be...

  221. How Much Is Enough?

    The description for this book is as follows: "What constitutes the good life? What is the true value of money?...

  222. How Much Surveillance Can Democracy Withstand?

    Article This article discusses how limits must be put on surveillance in order to maintain a healthy democracy. The author poses...

  223. How Noncompete Clauses Keep Workers Locked In

    Article In this article, the author discusses restrictions that were once limited to executives which are now spreading across the labor landscape....

  224. How not to bomb your offer negotiation

    Article In this article, Qureshi discusses what to do after you've landed your dream job. He takes a deep-dive into the negotiating process...

  225. How Russian Trolls Used Meme Warfare to Divide America

    Article This article describes how the Internet Research Agency (IRA), a Russian propaganda wing, infiltrated American social media users’ feeds with...

  226. How the Apple-1 Works

    Video This video provides a technical overview of the Apple-1 Computer. The technical aspects of the computer are described and shown as...

  227. How the Bobos Broke America

    Article In this article, the author discusses how the creative class was supposed to foster progressive values and economic growth. The...

  228. How to Care Less About Work

    Article In this article, Charlie Warzel and Anne Helen Peterson argue that American working culture is unsustainable. Warzel and Peterson ask: when...

  229. How to Deal With Deceptive Colleagues at Work

    Article In this article, the author describes ways in which employees deceive their coworkers and how deceptive behaviors lead to a...

  230. How to Fight Fake News on Vaccines

    Video This video explains how misinformation spread about the HPV vaccine and how one woman with cervical cancer fought to reverse that...

  231. How to find a meaningful job, or find purpose in the job you already have

    Video From the video description:  "Broaching the question 'What is my purpose?' is daunting – it's a grandiose idea, but research...

  232. How to Find Fulfilling Work

    Video This short video from "The School of Life" offers a framework and practical tips for finding work that is fulfilling,...

  233. How to Have Moral Courage and Moral Imagination?

    Video Every time we make a decision, we change the world just a little bit. This is why moral imagination plays...

  234. How to Improve Capitalism

    Video In this video, The School of Life provides four suggestions for reforming capitalism. First, there are many types of capitalism,...

  235. How to keep your team motivated

    Video In this video, the Kellogg School lays out ways business leaders can counteract the Social Loafing effect, the tendency for...

  236. How to make AI less racist

    Article This article discusses how negative biases, for example racial biases, can be baked into artificial intelligence algorithms through the use...

  237. How to Recognize Burnout Before You're Burned Out

    Article This article explains what burnout is and enumerates common work stressors, signs of burnout to watch for, and ways to combat burnout...

  238. How to Work Hard

    Article In this article, Graham address working hard and lessons he's learned.

  239. How WhatsApp Destroyed a Village

    Article This article discusses how false information about child abductions circulating WhatsApp in India caused at least 29 deaths from people attacking...

  240. HyperNormalisation

    Video In this video, Adam Curtis, a cult documentary maker, explores the falsity of modern life in his own inimitable style. Though he’s...

  241. IBM Punch Card

    Digital Artifact This article describes the history of the IBM Punch Card technology such as its technical development and its cultural impact. This...

  242. ‘I made Steve Bannon’s psychological warfare tool’: meet the data war whistleblower

    Article In this article, Christopher Wylie, a young man who was the brains behind Cambridge Analytica, comes forward to share his...

  243. Immigrants Help Solve the Looming STEM Worker Shortage

    Article In this article, the author promotes a looser immigration policy for foreign skilled workers. The author argues that there are not...

  244. Incels Categorize Women by Personal Style and Attractiveness

    Article This article describes the “Intel” Internet subculture. “Incels” are “involuntarily celibate” men—men who not only struggle to find sexual partners,...

  245. In Silicon Valley, Working 9 to 5 Is For Losers

    Article In this article, Dan Lyons describes the "Hustle Culture" phenomenon in Silicon Valley, where workers idolize overworking. Lyons outlines some...

  246. Interns’ Job Prospects Constrained by Noncompete Agreements

    Article In this article, Harriet Torry discusses legal pacts that can limit résumé content and employment options, including those for interns.

  247. In This Economy, Quitters Are Winning

    Article In this article, the authors discuss an increase in job-hopping which may give way to wage growth and productivity in...

  248. Introducing the LAN Turtle

    Video This video is an introduction to the LAN Turtle by Hak5 an infosec company founded in 2005. From the video description, "The LAN...

  249. Inventing Copyleft

    Article This book chapter is from Christopher Kelty's book called "Two Bits: The Cultural Significance of Free Software" that details the history of Free...

  250. Is Facebook Making Us Lonely

    Article In this article, Stephen Marche talks about how even though social media has made society more densely networked than ever, it may be making...

  251. Islamic State’s TikTok Posts Include Beheading Videos

    Article This article discusses how the Islamic state posted videos of executions and tortures to Tik tok. These videos are a...

  252. Is life meaningless? And other absurd questions

    Video In this video, TED-Ed discusses Albert Camus. It offers some biographical background before exploring his philosophy. The video separates his...

  253. Is Net Neutrality Good or Bad for Innovation?

    Article This article outlines the arguments surrounding net neutrality and its effect on the economy. There is no clear answer--economists have modeled...

  254. I Spent 24 Hours in the Metaverse. I Made Friends, Did Work and Panicked About the Future.

    Article This article is a journalist's reflections on spending 24 hours using Meta's Oculus Quest 2 virtual-reality headset. She noted that Metaverse meetings are...

  255. Is the H-1B Program a Cynical Attempt to Undercut American Workers?

    Article In this article, Derek Thompson looks at the pros and cons of the H1-B Visa program. While he concedes that...

  256. “It Gets Better”: Internet memes and the construction of collective identity

    Academic Paper This academic paper has the following abstract: In September 2010, a video titled “It Gets Better” was uploaded to YouTube,...

  257. It's hard to be a moral person. Technology is making it harder.

    Article Digital distractions such as social media and smartphones wreak havoc on our attention spans. Could they also be making us...

  258. I've spent 2 decades studying how work affects our health and well-being, and one solution is clear: Your job has to serve a purpose beyond a paycheck

    Article In this article, which is an excerpt from Rath's book "Life's Great Question: Discover How You Contribute To The World,"...

  259. I Was a Stranger Lecture Slides

    Lecture / slides Through these lecture slides for Notre Dame Computer Science and Engineering's Ethical and Professional Issues course, the following learning goals are...

  260. Join Wall Street. Save the World.

    Article In this article, Matthews writes about Jason Trigg, a bright young man who decided to become a hedge fund manager...

  261. Julian Assange: The 2011 60 Minutes Interview

    Article From the video description: Steve Kroft interviews the controversial founder of WikiLeaks. For more, click here: https://www.cbsnews.com/news/julian-assange-the-2011-60-minutes-interview/

  262. Just Because You Always Hear It, Doesn’t Mean It’s True: Gender Difference Explanations For Disparities in Tech Are Not Supported by Science

    Article In this article, NCWIT explains why gender differences are not supported by science, and how most disparities between men and women...

  263. Kant and Categorical Imperatives: Crash Course Philosophy

    Video In this video, get a crash course on Kant and Categorical Imperatives. Categorical Imperatives are unconditional moral obligations which are binding in all...

  264. Karl Marx on Alienation

    Video In this video, BBC Radio explains Marx's views on alienation. According to Marx, authentic work is what makes us human....

  265. Keystroke tracking, screenshots, and facial recognition: The boss may be watching long after the pandemic ends

    Article This article describes how companies track their employees through video feed data/facial recognition, keystroke tracking, and screenshots. This type of...

  266. Kindness is Underrated

    Article In this article, the author responds to Linus Tovalds’s tendency towards blunt, crass criticism with an argument for kindness. The...

  267. Leaking Like A Sieve Lecture Slides

    Lecture / slides Slides for Lecture 25 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The learning goals for...

  268. Lean In: Study of Women in Corporate America

    Report In this report, LeanIn.Org and McKinsey & Company studied over 750 companies over the course of the last 6 years (2015-2021) to...

  269. Legal Shield for Websites Rattles Under Onslaught of Hate Speech

    Article This article discusses Section 230 of the Communications Decency Act, which protects Internet companies from liability for content created by their...

  270. Leisure: The Basis of Culture

    Philosophical Text From the book description: "One of the most important philosophy titles published in the twentieth century, Josef Pieper's Leisure, the...

  271. Lets talk about the H-1B Visa

    Article In this article, the author describes the drawbacks of the current H-1B Visa program and proposes reforms so the program...

  272. Linus Torvalds defends his right to shame Linux kernel developers

    Article In this article, we see the interactions between the crass Linux creator Linus Torvalds and software developer Sarah Sharp. Sharp...

  273. Linus Torvalds: 'I'll never be cuddly but I can be more polite'

    Article In this article, Linus Torvalds admits that his interactions within the Linux developer community were rather strong while distancing himself...

  274. Linus Torvalds on his insults: respect should be earned

    Video In this video, Linus Torvalds (creator of Linux and Git), defends abrasive comments he makes towards other codes (e.g. "you...

  275. Linux Operating System

    Digital Artifact This article describes the digital artifact of the Linux Operating System which is a family of open-source Unix-like operating systems based on...

  276. Loving Your Job Is a Capitalist Trap

    Article In this article, Erin A. Cech claims that the pandemic forced Americans to reflect on their satisfaction with their work lives, prompting...

  277. Low Orbit Ion Cannon

    Digital Artifact This article describes the digital artifact Low Orbit Ion Cannon which was originally created by Praetox Technologies. The Low Orbit Ion Cannon...

  278. Machines, Modifications of Nature, and Engineering Ethics

    Article In this article, the author argues that while codes of conduct are important, they are not sufficient in solving the...

  279. Major camera company can sort people by race, alert police when it spots Uighurs

    Article This article describes a facial-recognition technology by the Chinese company Dahua that is tuned to spot Uighurs, a minority ethnic...

  280. Making sense of work: finding meaning in work narratives

    Article The abstract for this article is as follows: "This study examined how individuals make sense of their work narratives –...

  281. Masters of Crowds: The Rise of Mass Social Engineering

    Article This article provides a deep history of mass manipulation from the 1920s through the mid-1970s. This article is adapted from the...

  282. Maybe We All Need a Little Less Balance

    Article In this article, Brad Stulberg argues that balance is not something we should strive for. Stulberg argues that people are...

  283. Meditations (Marcus Aurelius)

    Philosophical Text In this classic work of stoic philosophy, Roman Emperor Marcus Aurelius writes notes to himself recording his thoughts on the good...

  284. Memes Against Decadence

    Article In this article, Ross Douthat explores how memes and other virtual "realities" can exist long enough to change the real...

  285. Memes in a Digital World: Reconciling with a Conceptual Troublemaker

    Academic Paper This academic paper has the following abstract: This paper re-examines the concept of “meme” in the context of digital culture....

  286. Memetic Warfare Lecture Slides

    Lecture / slides Slides for Lecture 15 of Ethical and Professional Issues in Notre Dame's Computer Science department. In this lecture, the following...

  287. Metaethics: Crash Course Philosophy #32

    Video In this video, Crash Course covers metaethics – which probes the foundation of morality. The video begins by distinguishing metaethics from...

  288. Metasploit Framework

    Digital Artifact This article details the digital artifact the Metasploit Framework or the Metasploit Project. This artifact is a computer security project that...

  289. Michael Sandel: 'The populist backlash has been a revolt against the tyranny of merit'

    Article In this article, Coman explains the views on meritocracy of Michael Sandel, one of the leading critics of free-market orthodoxy today....

  290. Midlife

    Book The description for this book is as follows: "How can you reconcile yourself with the lives you will never lead,...

  291. Mindset

    Book The description for this book is as follows: "'It’s not always the people who start out the smartest who end...

  292. MIT Report Examines How to Make Technology Work for Society

    Article This article describes the findings from MIT’s Task Force on Work of the Future. The report finds that while the...

  293. Modern Porn Education Is Totally Unprepared for Modern Porn

    Article This article highlights the need for teenagers to have porn literacy. The proliferation of extreme pornography can numb viewers of...

  294. More and Faster

    Lecture / slides Lecture slides for Lecture 08 of Ethical and Professional Issues in Notre Dame's Computer Science & Engineering department. These lecture slides cover...

  295. Most computer science majors in the U.S. are men. Not so at Harvey Mudd

    Article In this article, it takes a look at Harvey Mudd where more than half of computer science graduates are women.

  296. My Job, My Self: Work and the Creation of the Modern Individual

    Book From the book description:  "In My Job My Self, Gini plumbs a wide range of statistics, interviews with workers, surveys from employers...

  297. Naive Meritocracy and the Meanings of Myth

    Article In this article, Reagle proposes that so-called meritocracies reproduce extant members and favor incidental attributes; they are biased, susceptible to...

  298. Narrative technologies meets virtue ethics in alternate reality: investigating the possibility of a narrative virtue ethics of technology, using the example of pokémon go

    Academic Paper This academic paper has the following abstract: Virtue ethics offers a promising starting point for thinking about ethics of technology....

  299. Nerdy Strutting: How to Put Women Off the Tech Industry

    Article In this article, Judy Robertson discusses nerd-strutting, or "a style of interaction where people show off their knowledge by asking questions...

  300. Nessus Proprietary Security Scanner.

    Digital Artifact This technology is a digital artifact by Tenable which is the Nessus Properitary Security Scanner. This technology is properitary software from...

  301. Network Mapper (nmap)

    Digital Artifact This article presents the Network Mapper (nmap) tool created by Gordon Lyon who is also known by the psuedonym Fyodor Vaskovich. This tool...

  302. New Melleray Abbey: One Thing

    Video In this documentary video, the life of monks at the New Melleray Abbey is explored. At this monastery outside of...

  303. New Seeds of Contemplation

    Book The discription for this book is as follows: "New Seeds of Contemplation is one of Thomas Merton’s most widely read and...

  304. .nfo File

    Digital Artifact This article describes a digital artifact known as the .nfo file extension which is a shortening of info or information. This...

  305. Noncomplete Clause Causes Pop Up in Array of Jobs

    Article .In this article, the author shares their opinion on how supporters of the pending legislation argue that the proliferation of noncompetes is...

  306. Note to employees from CEO Sundar Pichai

    Article In this article, Google CEO Sundar Pichai responds to Damore's memo.

  307. Not Everyone in Tech Cheers Visa Program for Foreign Workers

    Article In this article, the authors highlight stories of American tech workers who lost their jobs to foreign H1-B Visa holders....

  308. Nvidia faked part of a press conference with a CGI CEO

    Article This article describes how Nvidia used a CGI/deepfake version of their CEO to give a portion of a keynote speech at a...

  309. One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority

    Article This article describes how China is using facial recognition technology to track the Uighurs, a minority ethnic group in China....

  310. OnlyFans Is Not a Safe Platform for ‘Sex Work.’ It’s a Pimp.

    Article In this article, the author argues that “sex work” is neither sex nor work, and that calling it that is...

  311. On Parenthood

    Article In this article, prominent software developer Jeff Atwood describes his love of fatherhood and how parenthood has changed him for...

  312. On the Orders of Work (Excerpts from Aristotle's "Politics")

    Philosophical Text In these excerpts from Aristotle's Politics, he explores the proper relationship between work, education, and government in a well-ordered society.

  313. On the Precipice? Lecture Slides

    Lecture / slides Lecture slides for the introductory lecture of Ethical and Professional Issues (in Computer Science). In this lecture, the following learning...

  314. On the Virtual Frontier of the Imagination

    Book In this book chapter, Walter Scheirer discusses a very early instance of faking the news in which a group of...

  315. Operation Sundevil

    Video The video provides a brief overview of Operation Sundevil from the 1990s. The operation was apart of a large hacker crackdown...

  316. Optimal Work

    Other Optimal Work is a paid service that aims to develop in its customers the ability to work optimally, free from anxiety, distraction,...

  317. Our Real Work

    Poem It may be that when we no longer know what to do we have come to our real work, and...

  318. Owning Ethics: Corporate Logics, Silicon Valley, and the Institutionalization of Ethics

    Article In this article, the authors study the attempts to institutionalize ethics within Silicon Valley tech companies. Through interviewing those responsible for thinking...

  319. Paul Graham has accidentally explained everything wrong with Silicon Valley’s world view

    Article In this article, the author counters some of the points that Paul Graham made in his article on Economic Inequality. She...

  320. PERUSALL Tutorial: Introduction to the platform

    From the video description: Here is an overview tutorial of what and how you can transform individual reading task to...

  321. Philosophy & Ethics of Technology | Is Technology Good, Bad or Neutral?

    Video In this video, the ideas and arguments from the philosophy paper "Is Technology Value Neutral?" by Boaz Miller are covered....

  322. Philosophy: Thomas Aquinas

    Video In this video, The School of Life discusses the philosophy of Thomas Aquinas, specifically his attempts to reconcile faith and...

  323. Phone Phreaking: A Call From Joybubbles

    Video This video depicts a phone phreaking call made by the hacker Joybubbles aka Josef Engressia, Jr. This original sound byte comes...

  324. Photoshop Fantasies

    Book In this piece, Walter Scheirer discusses the history of image manipulation. Although image manipulation is generally considered to be dishonest, Scheirer...

  325. Phrack Magazine

    Digital Artifact This digital artifact is an issue of Phrack Magazine which was and still is a popular zine for the underground hacking...

  326. Phrack Magazine - Issue 31

    Article This article is an introduction to Issue 31 of the popular underground hacking publication of Phrack Magazine. This particular article details...

  327. Physiognomy's New Clothes

    Article In this article, the authors discuss the history of physiognomy, or "scientific racism," and how some machine learning scientists today...

  328. Pillar Investigates: USCCB gen sec Burrill resigns after sexual misconduct allegations

    Article This article describes how Monsignor Jeffrey Burrill, Catholic priest and former general secretary of the U.S. bishops’ conference, was accused of sexual...

  329. Pitfalls in Machine Learning Research: Reexamining the Development Cycle

    Academic Paper This academic paper has the following abstract: Applied machine learning research has the potential to fuel further advances in data science,...

  330. Plato and Aristotle: Crash Course History of Science #3

    Video In this video, Crash Course introduces the basics of Plato's and Aristotle's lives and philosophies. 

  331. Plato's Best (And Worst) Ideas

    Video In this video, TED-Ed lays out in broad terms the main ideas of Plato, and some of the consequences (good...

  332. Political tension at Google is only getting worse

    Article In this article, another former engineer has alleged that the company fired him over his political beliefs.

  333. Posting less, posting more, and tired of it all: How the pandemic has changed social media

    Article In this article, it examines how after one year, Covid-19 has altered how people use social media.

  334. Privacy Fundamentalism

    Article In this article, the author argues that there are alarmist privacy arguments out there and explains why one by Farhad...

  335. Process (Excerpt from "Games and Why They Matter: A Conversation with Thi Nguyen")

    Video In this video, narrator Thi Nguyen describes the value in work as process rather than product. He connects this to...

  336. Programmers: Stop Calling Yourselves Engineers

    Article In this article, the author argues that programmers should stop calling themselves engineers. The author argues that "engineering" implies a...

  337. Programming, Power, and Responsibility

    Article In this article the author forms a metaphor of code as a social contract and reflects on the power given to...

  338. Protesters are weaponising memes to fight police surveillance

    Article This article describes how amidst the Black Lives Matter/anti-police brutality protests of spring 2020, memes were used as a tool...

  339. Punching the Clock (from the book Bullshit Jobs)

    Article In this excerpt published by Harper's Magazine from his work Bullshit Jobs, Graeber explores why it is that meaningless work makes us so...

  340. Push for Gender Equality in Tech? Some Men Say It’s Gone Too Far

    Article In this article, it discusses how some men have recently spoken out about their feelings on gender equality in tech.

  341. Qanon Deploys 'Information Warfare' to Influence the 2020 Election

    Article This article describes how the Qanon conspiracy theories infliltrate social media. The article argues that the spread of Qanon content signals a...

  342. Ransomware attacks are getting more complex and even harder to prevent

    Article This article discusses the threat of ransomware attacks. Ransomware attackers are launching attacks faster than vendors can patch the vulnerabilities, and...

  343. Reading Quiz 01

    Reading Quiz This reading quiz was used in the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre...

  344. Reading Quiz 02

    Reading Quiz This reading quiz was used in the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre...

  345. Reading Quiz 03

    Reading Quiz The third reading quiz for the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department. The quiz...

  346. Reading Quiz 04

    Reading Quiz This reading quiz for the Ethical and Professional Issue course in Notre Dame's Computer Science and Engineering Department covers the following...

  347. Reading Quiz 05

    Reading Quiz This reading quiz covers the following readings: How bosses are (literally) like dictators (Anderson) The code I'm still ashamed of (Sourour)...

  348. Reading Quiz 06

    Reading Quiz This reading quiz from the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department covers the following...

  349. Reading Quiz 07

    Reading Quiz This reading quiz from the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department covers the following...

  350. Reading Quiz 08

    Reading Quiz This reading quiz was used in the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre...

  351. Reading Quiz 09

    Reading Quiz This reading quiz for Ethical and Professional Issues in Notre Dame's Computer Science and Engineering Department covers the following readings: Why...

  352. Reading Quiz 10

    Reading Quiz This reading quiz was used in the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre Dame....

  353. Reading Quiz 11

    Reading Quiz This reading quiz was used in the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre...

  354. Reading Quiz 12

    Reading Quiz This reading quiz was used in the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre...

  355. Reading Quiz 13

    Reading Quiz This reading quiz was used in the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre...

  356. Reconsidering Anonymity in the Age of Narcissism

    Article In this article, Gabriella Coleman reflects on the importance of anonymity and how it is almost impossible on the Internet...

  357. Red Box (Phreaking)

    Article This article provides a technical description and history of the red box phone phreaking device. This device was created and utilized...

  358. Reddit cracks down on abuse as CEO apologizes for trolling the trolls

    Article This article describes how user trust in Reddit was compromised when the CEO used his admin access privilege to tamper with comments on r/the_donald....

  359. Reddit Troll Ban Helped Cut Hateful Speech

    Article This article discusses the results of a quasi-experiment on the effect of hate speech on Reddit after the banning of two subreddits full of...

  360. Reflecting On One Very, Very Strange Year At Uber

    Article In this article, Susan Fowler discusses her reasons for leaving Uber.

  361. Reflecting on Susan Fowler’s Reflections

    Article In this article, Aimee Lucido reflects on the article written by Susan Fowler, discussing her negative experience with Uber.

  362. Reflections on Trusting Trust

    Article This article is a written version of an Alan Turing Award Lecture from Ken Thomson in 1984. This article is a...

  363. Remote OS detection via TCP/IP Stack FingerPrinting

    Article This article is from issuse 54 of Phrack Magazine in 1998 written by Gordon Lyon aka Fydor, the creator of the...

  364. Rene Carmille

    Article This article details the life of Rene Carmille who is known to be one of the first hackers. This article gives a...

  365. Representing Hacker Culture: Reading Phrack

    Book Chapter This book chapter from Douglas Thomas' book Hacker Culture details an outsider's guide to reading the hacker zine Phrack. This chapter discusses...

  366. “Repugnant” online discussions are not illegal thoughtcrime, court rules

    Article This article describes a court ruling about disturbing sexual fantasies posted online. A US Federal Court of Appeals ruled that it is...

  367. Researchers Create 'Master Faces' to Bypass Facial Recognition

    Article This article describes how researchers generated nine "master key" fake faces that are able to impersonate almost half of the faces in...

  368. Resistance to the current: the dialectics of hacking

    Book Chapter This book chapter is titled "Internet Relay Chat: A Time Machine That Stood the Test of Time" and details the history...

  369. Responses to Critiques on Machine Learning of Criminality Perceptions

    Academic Paper In this academic paper and its response, the authors of a controversial paper that uses machine learning to determine criminality...

  370. Rest

    Book The description for this book is as follows: "Overwork is the new normal. Rest is something to do when the...

  371. RETRACTED ARTICLE: Criminal tendency detection from facial images and the gender bias effect

    Academic Paper This retracted academic paper seeks to predict criminality from facial images using deep learning. Other scientists criticize this work as having flawed methods.

  372. Revisiting Meatspin, the NSFW site that shocked a generation

    Article This article tells the story of the shocking website “meatspin” which depicted a penis spinning to the tune of Dead...

  373. Revolutionary Aristotelianism: Ethics, Resistance and Utopia

    The description for this book is as follows: "This book includes revisions of papers originally presented at the inaugural conference...

  374. Salary Negotiation: Make More Money, Be More Valued

    Article In this article, McKenzie discusses why negotiation matters, how to shift your mindset to embrace negotiation, and when/how a negotiation happens.

  375. Scheirer on Fake Content

    Video In this video, Walter Scheirer talks about his research and insight into fake content on the internet, today and throughout its...

  376. Scheirer on Improving Tech

    Video From the video description: Prof. Walter Scheirer (Computer Science, University of Notre Dame) thinks about the state of the tech...

  377. Scheirer on Start-ups

    Video In this video, Dr. Walter Scheirer discusses the benefits of starting your own start-up rather than working for an established company...

  378. Scheirer on Tech Ethics

    Video In this video, Dr. Sheirer gives an introduction to tech ethics.

  379. Science Fiction Lecture Slides

    Lecture / slides Slides for Lecture 22 of Ethical and Professional Issues  in Notre Dame's Computer Science and Engineering department. The learning goals for...

  380. Seeing Is Believing Lecture Slides

    Lecture / slides Slides for lecture 20 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. In this lecture, the...

  381. Self-driving car accidents: Robot drivers are ‘odd, and that’s why they get hit’

    Article This article describes a surprising reason why self-driving vehicles get into accidents: they are too cautious. The article argues that because...

  382. Self-driving cars still can’t mimic the most natural human behavior

    Article In this article, the author argues that in order to have safer self-driving cars, the cars need to be able to mimic...

  383. Self-Driving Cars Still Don't Know How to See

    Article In this article, Meredith Broussard highlights the dangers of self-driving cars. Broussard expands upon the fact that cars don't see...

  384. Senate passes controversial online sex trafficking bill

    Article This article describes an online sex trafficking bill passed by the Senate in 2018. The bill, called the Allow States and Victims...

  385. Sex and STEM: Stubborn Facts and Stubborn Ideologies

    Article In this article, the authors discuss their thoughts on the "sex differences" in STEM.

  386. Shop Class As Soulcraft: An Inquiry into the Value of Work

    Book This bestselling book is described by IndieBound as "A philosopher/mechanic's wise (and sometimes funny) look at the challenges and pleasures of working...

  387. Should I Always Listen to My Boss? Lecture Slides

    Lecture / slides Slides for Lecture 10 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering Department. This lecture covers...

  388. Should Work Be Passion, or Duty?

    Article In this article, Firmin DeBrabander points out that, as factors like productivity and quality of life increase, other countries are working less...

  389. Silicon Valley Isn't a Meritocracy. And It's Dangerous to Hero-Worship Entrepreneurs

    Article In this article, it discusses meritocracy and entrepreneurialism reinforce a closed system of privilege. It also reveals the threadbare nature...

  390. Silicon Valley's “Body Shop” Secret: Highly Educated Foreign Workers Treated Like Indentured Servants

    Article In this article, NBC's Bay Area Investigative Unit and The Center for Investigative Reporting report on an organized system for supplying cheap...

  391. Silicon Valley's Unchecked Arrogance

    Article In this article, the author argues that the idea of Universal Basic Income comes from Silicon Valley’s arrogant view toward...

  392. Smashing the Stack for Fun and Profit

    Article This article is from issue 49 of Phrack Magazine written by Elias Levy who also goes by the handle Aleph One in...

  393. Sniffer FAQ

    Article This article is written by an early computer security company founded in 1994 and later was acquired by IBM in 2006....

  394. Snuff: Murder and torture on the internet, and the people who watch it

    Article This article discusses shocking and gruesome content online and the people who view it. The viewers of gruesome content online...

  395. Social Engineering A Way of Life

    Article This article is written by the hacker Malefactor [OC] in textfiles.com which provides a guide to hackers and phreaks on social...

  396. So Much for Decentralized Internet

    Article In this article, Georgia Tech professor Ian Bogost makes an urgent argument in The Atlantic that the commercialization and centralization of the internet puts...

  397. Spacewar!

    Digital Artifact This game is a digital artifact of a Javascript version of the popular Spacewar! video game that is one of the...

  398. Stalking the Wily Hacker

    Article This article tells the story of a hacker who penetrated Lawrence Berkeley National Laboratory in the 1980s. It provides an anecdotal perspective...

  399. Status Anxiety

    Book In this book, Alain de Botton explores the anxiety induced by fear of what others think of us. He explains...

  400. Status Anxiety (Video)

    Video In this video, The School of Life discusses status anxiety – the anxiety that arises when we get asked "what...

  401. Stewardship of global collective behavior

    Academic Paper Collective behavior provides a framework for understanding how the actions and properties of groups emerge from the way individuals generate...

  402. Still the Trump social media ban

    Article This article puts former president Donald Trump's social media ban in perspective by inviting readers to hypothetically consider their reactions if...

  403. Storage Media

    Article This article provides the technical developments of various data storage methods and mediums throughout history. These digital artifacts provide an understanding...

  404. Study finds gender and skin-type bias in commercial artificial-intelligence systems

    Article This article tells the story of how Joy Buolamwini, a Black researcher at the MIT Media Lab, discovered that facial...

  405. Stuxnet Worm

    Digital Artifact This article describes the history and technological development of the Stuxnet Worm. The Stuxnet Worm is a malicious computer worm that was...

  406. Submit documents to WikiLeaks

    Other This is the submission page to WikiLeaks: https://wikileaks.org/Press.html#submit_help_contact This page can be important for students to see as they learn about...

  407. ‘Success Addicts’ Choose Being Special Over Being Happy

    Article In this article, Brooks compares the relentless pursuit of success to an addiction. He argues that work can be a...

  408. Synthetic Media: How deepfakes could soon change our world

    Article This article discusses deepfakes. Deepfakes are audio and video recordings that appear to be real, but actually use artificial intelligence...

  409. Tech Giants, Once Seen as Saviors, Are Now Viewed as Threats

    Article In this article, Streitfeld notes that at the start of this decade, the Arab Spring blossomed with the help of social media,...

  410. Technical and Cultural Revolutions

    Video This video is from OSCON 2014 and the keynote speaker Tim O'Reilly, the founder and CEO of O'Reilly Media. From the video...

  411. Technology and the Virtues: A Philosophical Guide to a Future Worth Wanting

    Book From the abstract of the book listed on the Oxford University Press Scholarship Online: "This book explores the implications of...

  412. Ten Rules for Negotiating a Job Offer

    Article In this article, the author provides 10 rules that can help job searchers negotiate with potential employers. 

  413. Terminating Service for 8Chan

    Article This blog post from Cloudflare explains why two years after kicking The Daily Stormer off their network, they decided to stop...

  414. The Age of AI Hacking Is Closer Than You Think

    This article is adapted from A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back, by Bruce...

  415. The Alt-Right Are Savvy Internet Users. Stop Letting Them Surprise You

    Article In this article, the author discusses how far-right influencers gain popularity on YouTube through gaming the "attention economy." The author...

  416. The Art of Deception

    Book This book is a digital artifact used in the course to represent the area of social engineering. The book details several...

  417. The Art of Port Scanning

    Article This article from issue 51 of Phrack Magazine is written by Gordon Lyon aka Fydor about the nmap network scanner. This article introduced...

  418. The Best Action is the One in According with Universal Rules

    Book In this book excerpt, James Rachels explains the Kantian view. This view states that people should always be treated as...

  419. The Best Action is the One That Exercises the Mind's Faculties

    Philosophical Text In this philosophical text, Aristotle discusses what constitutes an ethical action. He argues that an ethical action is one that...

  420. The Best Action is the One with the Best Consequences

    Book In this book excerpt, it examines three ethical models: utilitarian, Kantian, and Nicomachean. In studying the following sections, consider how...

  421. The Bullet Journal Method

    Book In this book, Carroll outlines his method for intentional living: the bullet journal. This is a mindfulness practice designed to increase...

  422. The Burnout Society

    Book In this book, philosopher Byung-Chul Han argues that the so-called advances of the 21st century were supposed to make our lives...

  423. The Capital of Meritocracy is Silicon Valley, Not Wall Street

    Article In this article, the author explains that meritocracy and entrepreneurialism reinforce a closed system of privilege. It also reveals the...

  424. The Case For Doing Nothing

    Article In this article, Olga Mecking introduces the Danish concept niksen--doing nothing. Mecking highlights the benefits of doing nothing from time to time--it...

  425. The Case for Working With Your Hands

    Article In this article, Crawford argues that work in the trades, while often considered lowly or a last resort, can actually...

  426. The Children of Pornhub

    Article This article exposes how easy it is for pornographic videos posted without the subject of the video’s consent and/or pornographic...

  427. The code I'm still ashamed of

    Article In this article, the author describes an experience he had as a young coder where his job required him to...

  428. The compelling case for working a lot less

    Article In this article, Amanda Ruggieri explores the compelling evidence against nonstop work, including that the work produced at the end...

  429. The Conscience of a Hacker

    Article This article was written by a computer hacker who went by the pseudonym The Mentor. The article sheds light on the...

  430. The Convenience-Surveillance Tradeoff

    Article In this article, Adrienne LaFrance discusses how Americans view the tradeoffs between privacy and surveillance based on a recent. Pew study....

  431. The “Criminality from Face” Illusion

    Academic Paper This academic paper has the following abstract: The automatic analysis of face images can generate predictions about a person’s gender,...

  432. The Cult of Overwork

    Article In this article, James Surowiecki argues that overwork is increasingly characteristic of high-paid workers. However, overwork worsens productivity and quality. The effects...

  433. The Culture Wars Have Come to Silicon Valley 560

    Article In this article, the author discusses the culture wars that have consumed politics in the United States and have now...

  434. The Dangers of Having Too Little to Do

    Video In this video, the School of Life argues that, while we think we'll be happy once the work is done,...

  435. The Dehumanizing Myth of the Meritocracy

    Article In this article, Ehmke looks at what happens when the meritocracy and open source software collide. She hopes to answer the...

  436. The Division of Labor

    Video In this video, Dr. van Heerikhuizen explains the impact of the division of labor, drawing on the first chapter of Adam...

  437. The Driverless-Car Pile-Up

    Article In this article, venture capitalist Michael Gibson describes his take on which autonomous vehicle companies to invest in. Gibson argues...

  438. The Empathy Gap in Tech: Interview with a Software Engineer

    Article In this article,  Claire Lehmann interviews a talented engineer who is "not neurotypical" and discusses the lack of empathy in the...

  439. The ethical foundations of economics in ancient Greece, focusing on Socrates and Xenophon

    Other The abstract for this research article is as follows:  Purpose Economics had a strong linkage to ethics up to the...

  440. The existentialist’s reluctant guide to life

    Article In this article, Ephrat Livni and Olivia Goldhill contend that even those who feel constant existential dread brings a sort of freedom....

  441. The First Hacker

    Video This video gives an overview of Rene Carmille's contribution as the first hacker. From the video description: "Based on the extraordinary...

  442. The First Women in Tech Didn’t Leave—Men Pushed Them Out

    Article In this article, Mims discusses the prevalence of sexism in the tech industry.  In this article, hear female entrepreneurs and...

  443. The Future of Not Working

    Article In this article, Annie Lowrey investigates an experiment in universal basic income that is being run by the NGO GiveDirectly...

  444. The Future Of The Culture Wars Is Here, And It's Gamergate

    Article This article discusses how the GamerGate controversy fits in with the cultural context of the culture wars at large. After a...

  445. The Future of Work in America

    Report In this report, the McKinsey Institute analyzes the impact of automation on the US job market, looking both across time...

  446. The Government's Fight to Make Encryption Illegal

    Video This video is the third-part of a four part documentary by ReasonTV titled "Cypherpunks Write Code". From the video description: In 1977,...

  447. The Hacker Conference: A Ritual Condensation and Celebration of a Lifeworld

    Academic Paper This paper written by Gabriella Coleman, anthropologist and expert on all things computer hacking, provides a new scholarly perspective on hacker conferences....

  448. The Hacker Crackdown (Complete Book)

    Book The complete online version of the book The Hacker Crackdown. From Wikipedia: "The Hacker Crackdown: Law and Disorder on the...

  449. The Hacker Hacked

    Article This article discusses how the original hacker ethos was "gentrified" by yuppies. The original hacker ethos was wild with an outsider...

  450. The Hackerspace Movement

    Video This video is a Ted Talk given by Mitch Altman, the inventor and creator of the TV-B-Gone technology and famous hardware hacker....

  451. The Hard Work of Being Lazy

    Video In this video, The School of Life argues that sometimes it is difficult to be lazy enough. We ought to...

  452. The Human Condition

    Book The description for this book is as follows: "A work of striking originality, The Human Condition is in many respects more relevant...

  453. The Improbability Party

    Article This article discusses how data scientists try to predict the future why they will always have trouble when they try to...

  454. The incredibly intricate badges of Def Con

    Article This article details the creative badges created by hackers for their yearly hacking conference called DefCon. This article specifically details the...

  455. The Intellectual Life

    Book The description for this book is as follows:  "Fr. Sertillanges's teachings are as timeless as any truths which describe the...

  456. The Internet's public enema No. 1

    Article This article discusses the shock content website Rotten.com. Rotten.com is a database of horrifying images that gets around 200,000 visitors...

  457. The Irrelevance of Ethics

    Book Chapter The abstract of this chapter is as follows:

  458. The Light It Up Contest

    Video This video is by the famous hacker George Hotz also known as Geohot. He is known for developing iOS jailbreaks, reverse engineering...

  459. The Meaning of Life: A Very Short Introduction

    Book The description of this book is as follows:  "The phrase "the meaning of life" for many seems a quaint notion...

  460. The Menace and Promise of Autonomous Vehicles

    Article In this article, Jacob Silverman explores the issue of when autonomous vehicles make mistakes and cause accidents. Silverman highlights the...

  461. The metaverse is here

    Article In this article, Bruno Maçães discusses the Metaverse. He explains the technical specifications needed to support the Metaverse, imagines the user...

  462. The Moral Complexities of Working With Julian Assange

    Podcast From the podcast description: Many have considered Julian Assange, the founder of WikiLeaks, to be a hero of the free speech movement...

  463. The Morality of Whistle-Blowing

    Article From the article description: Computer scientists, like other professionals, may find a conflict between their loyalties and their obligation to...

  464. The Most Good You Can Do

    Book The description for this book is as follows: "Peter Singer’s books and ideas have been disturbing our complacency ever since...

  465. The Myth of Sisyphus

    Philosophical Text In The Myth of Sisyphus, Camus explores what he takes to be the absurdity of the human condition. He likens us...

  466. The Need for Roots

    Book The description for this book is as follows: "Hailed by Andre Gide as the patron saint of all outsiders, Simone...

  467. The Need for Roots brought home the modern era's disconnection with the past and the loss of community

    Article In this article, Mishra connects Simone Weil's concept of uprootedness to her own experiences moving to a Himalayan village. Uprootedness...

  468. The New Age of Surveillance

    Article In this article, the author discusses how the emergence of the Internet of Things is ushering in a new age...

  469. The New Era of Corporate Censorship

    Article This blog post discusses the situation of Cloudflare removing The Daily Stormer's account. The author argues that tech companies deciding what...

  470. The Newly Reintroduced Phrack Issue 70

    Article This article describes Phrack Magazine's comeback in 2021. Phrack Magazine is an online hacker magazine. This article describes how issues of...

  471. The New Workplace: Where Meaning And Purpose Are More Important Than Ever

    Article In this article, business consultant Renelle Darr outlines the components needed for your work environment to feel meaningful for your...

  472. The Noncompete Clause Gets a Closer Look

    Article In this article, Lauren Weber talks about Biden’s executive order which asks FTC to limit the use of agreements that keep workers...

  473. The pandemic has crushed young people’s spirits

    Article In this article, Thomas S. Hibbs claims that the pandemic has given rise to widespread dislocation in a number of ways....

  474. The Perils of Meritocracy

    Article In this article, Garber discusses meritocracy. It’s one of the most loved ideas in American life, but she argues that it should...

  475. The Post-Meritocracy Manifesto

    Article In this article, the author proposes a different set of values and principles in open source software development. Meritocracy is...

  476. The Power of Habit

    Book The description for this book is as follows: "In The Power of Habit, award-winning business reporter Charles Duhigg takes us to the...

  477. The Problem with Work: Feminism, Marxism, Antiwork Politics, and Postwork Imaginaries

    Book The description for this book is as follows: "In The Problem with Work, Kathi Weeks boldly challenges the presupposition that work,...

  478. The Python Code of Conduct

    Article In this article, the former director and vice chairman of the Python Software Foundation outlines a code of conduct for...

  479. The Reality of Developer Burnout

    Article In this article, Kenneth Reitz shares his experience of software developer burnout and outlines mechanisms he put in place to...

  480. The Real White Fragility: Does the White Upper Class Feel Exhausted and Oppressed by Meritocracy?

    Article In this article, the author examines the question: does the white upper class feel exhausted and oppressed by meritocracy?

  481. There's an Automation Crisis Underway Right Now, It's Just Mostly Invisible

    Article This article describes the results of a research study on workplace automation’s impact on the individual worker. While the study...

  482. The Return of Anonymous

    Article This article tells the story of the return of the hacking and activist group Anonymous. In 2012 Anonymous reached the height...

  483. The Return of Work in Critical Theory: Self, Society, Politics

    Book In this book, the authors explore what work is and why it is significant for us as people. They begin...

  484. The Rise of the Meritocracy

    The description for this book is as follows: "Michael Young has christened the oligarchy of the future "Meritocracy." Indeed, the...

  485. The Rise of Workplace Surveillance

    Podcast From the episode's notes:  Across industries and income brackets, a growing number of American workers are discovering that their productivity...

  486. These 6 tech companies have made the controversial decision to try to operate in China, where the government can demand social media posts be removed or search results be censored

    Article This article outlines six different ways tech companies have censored content in order to operate in China amidst strict Chinese Internet...

  487. The Secret History of Hacking

    Video This video depicts some of the secret side of the history of hacking from black hat hackers to white hat hackers....

  488. The Secret History of Women in Coding

    Article In this article, Clive Thompson recounts the history of women in coding, looking at many different female pioneers in the field.

  489. The Secretive Company That Might End Privacy as We Know It

    Article This article discusses the controversial face recognition technology company Clearview AI. The article details how Clearview AI was founded, how...

  490. The Semplica-Girl Diaries

    Fiction In this short fiction piece, George Saunders writes diary entries from the perspective of a person living in a not-so-distant...

  491. The shock and pain of cyber-bullying

    Article This article describes how cyberbullying can affect a family from two different perspectives: first, from the perspective of the family who lost...

  492. The Spectacular Rise and Fall of WeWork

    Video In this video, Bloomberg Quicktake tells the story of the rise and fall of WeWork, a commercial office leasing company...

  493. The Terrifying Power of Internet Censors

    Article This article discusses the situation in which Cloudflare terminated The Daily Stormer's account. The author proposes that this event is a...

  494. The Trolley Problem

    Video In this video, BBC Radio 4 discusses the famous Trolley Problem. In this ethical thought experiment, you witness that a...

  495. The Trolley, the Bull Bar, and Why Engineers Should Care About the Ethics of Autonomous Cars

    Academic Paper This academic paper has the following abstract: "Everyone agrees that autonomous cars ought to save lives. Even if the cars do...

  496. The Trolls Are Winning the Internet, Technologists Say

    Article In this article, Adrienne LaFrance describes how Internet trolls shape discourse online. LaFrance notes that the current solutions will push...

  497. The Tyranny of Merit

    The description for this book is as follows: "The world-renowned philosopher and author of the bestselling Justice explores the central question of...

  498. The Tyranny of Merit (Video)

    Video In this video, Michael discusses what accounts for our polarized public life, and how we can begin to heal it....

  499. The United States Isn't Doomed to Lose the Information Wars

    Article In this article, Doowan Lee discusses the ways China and Russia have launched disinformation attacks online and suggests a few...

  500. The US System for "Skilled" Migrants is Broken

    Article In this article, the author provides an overview of the H1-B Visa, explains why it was created, and describes some...

  501. The WeWork Documentary Explores a Decade of Delusion

    Article In this article, Lizzie Widdicombe summarizes the documentary “WeWork: Or the Making and Breaking of a $47 Billion Unicorn." Widdicombe provides...

  502. The WIRED Guide to Net Neutrality

    Article This article provides a overview of the struggle to maintain net neutrality. Both the history of net neutrality and the future...

  503. The Woke Meritocracy

    Article In this article, the author discusses how telling the right stories about overcoming oppression in the right way became a...

  504. The Woman Bringing Civility to Open Source Projects

    Article In this article, Coraline Ada Ehmke is featured as "the woman bringing civility to open source projects". Ehmke is the principal...

  505. The Work-Family Imbalance

    Article In this article, Anand Iyer discusses the importance of prioritizing work-family life balance, especially for fathers. Iyer presents research that...

  506. The World Needs Deepfake Experts to Stem This Chaos

    Article This article describes a situation in Myanmar in which a political prisoner's confession video was accused as being a deepfake because...

  507. ‘The World’s Biggest Terrorist Has a Pikachu Bedspread’

    Article This article tells the story of Reality Winner, an American Whistleblower who was sentenced for leaking a government report about Russian...

  508. This researcher programmed bots to fight racism on Twitter. It worked.

    Article In this article, Kevin Munger describes an experiment he performed on Twitter to attempt to discourage users from using harassing...

  509. Thoughts on Network Neutrality, the FCC, and the Future of Internet Governance

    Article In this blog post, Matthew Prince, the CEO of Cloudflare, shares his thoughts on FCC regulations that regulate Internet Service Providers....

  510. Thus Spoke Zarathustra

    Book The description for this book is as follows: "Nietzsche was one of the most revolutionary and subversive thinkers in Western...

  511. To Be a Better Philanthropist, Think Like a Poker Player | Liv Boeree on Effective Altruism

    Video In this video, Liv Boeree explains the effective altruism movement, which seeks to apply the scientific method to charitable giving...

  512. To be of use

    Poem In this poem, Marge Piercy glorifies work and workers. She claims that meaningful work is a natural desire of humans, and...

  513. To catch a priest

    Article In this article, the author speculates how cell phone data was used to demonstrate that Msgr. Jeffrey Burrill was using...

  514. ToneLoc

    Article This article from the textfiles website by two hackers with handles Minor Threat & Mucho Maas provide a user manual for the well...

  515. Triumphs of Experience

    Book The description from this book is as follows: "At a time when many people around the world are living into...

  516. Trust the News? Lecture Slides

    Lecture / slides In these lecture slides for the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department, the following...

  517. Twitter begins emailing the 677,775 Americans who took Russian election bait

    Article This article details how Twitter emailed all users who interacted with accounts confirmed to be from the Russian troll farm that meddled...

  518. Uber Video Shows the Kind of Crash Self-Driving Cars Are Made to Avoid

    Article This article describes the video footage from an Uber-owned autonomous vehicle that hit and killed a pedestrian. From the video it...

  519. Unauthorized Access

    Video This video is a documentary about hackers by Annalisa Savage from 1994. From the video description, "This is a nostalgic hacker documentary...

  520. Understanding Visual Memes: An Empirical Analysis of Text Superimposed on Memes Shared on Twitter

    Academic Paper This academic paper has the following abstract: Visual memes have become an important mechanism through which ideologically potent and hateful...

  521. Unix Use and Security From The Ground Up

    Article This article written by the hacker The Prophet for textfiles.com about the security and uses of Unix. Hackers in the early 1990s would...

  522. Unmasking Reddit's Violentacrez, The Biggest Troll on the Web

    Article This article exposes the man behind the Reddit account Violentacrez. Up until this article was published, Violentacrez, a prominent Reddit...

  523. U.S. House unanimously approves sweeping self-driving car measure

    Article This article describes a unanimous approval by the US House of Representatives in 2017 to speed the deployment of self-driving cars...

  524. Using Philosophy to Deal with a Mid-Career Crisis

    Video In this video, philosophy professor Kieran Setiya discusses how he used philosophy to address a midlife crisis, which prompted him to...

  525. US military must prepare for POW concerns in the deepfake era

    Article This article describes the threat deepfakes present to prisoner of war situations. Previously, authoritarian regimes have tried to exploit American...

  526. Utilitarianism: Crash Course Philosophy

    Video In this video, get a crash course on Utilitarianism. Utilitarianism is the doctrine that actions are right if they are useful...

  527. 'Utterly horrifying': ex-Facebook insider says covert data harvesting was routine

    Article In this article, we hear the concerns of Sandy Parakilas, a former Facebook employee who directly observed Facebook treating user...

  528. UW professor: The information war is real, and we’re losing it

    Article In this article, the author discusses Kate Starbird, a professor at the University of Washington, and her study of conspiracy theories...

  529. Violent memes and messages surging on far-left social media, a new report finds

    Article This article describes how memes incited violence on left-wing social media in the summer of 2020 after the killing of George...

  530. Virtualized Horror Lecture Slides

    Lecture / slides Slides for Lecture 16 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The learning goals for...

  531. Virtue and Technology (part 1) Lecture Slides

    Lecture / slides In these lecture slides, the Virtue Ethics framework is introduced as a framework for evaluating ethical issues in technology. These...

  532. Virtue and Technology (part 2) Lecture Slides

    Lecture / slides In these lecture slides, Paul Blaschko and Sam Kennedy give a guest lecture to Walter Scheirer's Ethical and Professional Issues...

  533. Visa Rejections for Tech Workers Spike Under Trump

    Article In this article, the author assesses the impact of the stricter H-1B Visa policies enacted under former President Trump. The author follows...

  534. Vita Activa and the Human Condition (Chapter 1)

    Philosophical Text In the first chapter of her book The Human Condition, Hannah Arendt describes the "Vita Activa," or the active life...

  535. Vita activa, the Spirit of Hannah Arendt (Trailer)

    Video In this video, the IDFA (International Documentary Film Festival Amsterdam) provides a trailer for a documentary presented at IDFA 2015...

  536. Wages Against Housework

    Article In this short essay, Silvia Federici argues not only that women should receive wages for the housework they are expected to do, but...

  537. Walter Scheirer Interviews Kevin Bowyer

    Video In this video, Dr. Walter Scheirer Interviews facial recognition and biometrics expert Dr. Kevin Bowyer about the ethics of facial...

  538. Walter Scheirer Interviews Kirsten Martin

    Video In this video, Prof. Walter Scheirer (Computer Science, Notre Dame) interviews Dr. Kristen Martin, expert on technology ethics and privacy,...

  539. Walter Scheirer Interviews Ron Metoyer

    Video In this video, Prof. Walter Scheirer (Computer Science, University of Notre Dame) interviews Dr. Ron Metoyer, Professor of Computer Science...

  540. Want To Find Your Purpose At Work? Change Your Perceptions

    Book In this article, Tracy Bower argues that the way in which you think about your work is critical to finding fulfillment....

  541. War Dialer

    Digital Artifact This article provides historical context and the technical developments in wardialing and war dialers. War dialing is a technique developed by hackers...

  542. Warez: The Infrastructure and Aesthetics of Piracy

    Book This book is written by Martin Paul Eve, a Professor of Literature, Technology and Publishing, about the Warez Scene and community. This...

  543. Watch Me Demo My New IRC Client on an 80s Retro Computer

    Video This video is a video of a demo of Internet Relay Chat (IRC) on an 80s retro computer. The IRC is highly...

  544. We Are Legion - The Story of the Hacktivists

    Video In this video clip from the documentary "We Are Legion," 4Chan's influence on Internet culture and trolling is described. The impact...

  545. We Are Legion The Story of the Hacktivists

    Video This video is a documentary directed by Brian Knappenberger that gives a detailed look at the beginnings of hacktivist group `Anonymous', and how they...

  546. Wearing Many Hats: The Rise of the Professional Security Hacker

    Article This article in Data & Society is a discussion with Matt Goerzen and Gabriella Coleman about the evolving culture around exploits development....

  547. We desperately need a way to defend against online propaganda

    Article This article describes how fake news spreads on social media, why "not feeding the trolls" isn't a sufficient solution, and why...

  548. ‘We Got To Be Cool About This‘: An Oral History of the L0pht, Part 1

    Article This article provides an overview of how the influential hacking group L0pht formed in the 90s. The article tells the story...

  549. We Hire the Best, Just Like Everyone Else

    Article In this article, Jeff Atwood is skeptical about hiring the "best" people and advocates for different approaches. 

  550. Welcome to the Age of Privacy Nihilism

    Article In this article, Ian Bogost provides an overview of the history of business intelligence. While the uncannily-appropriate nature of the targeted...

  551. We only hire the trendiest

    Article In this article, Dan Luu discusses the pitfalls of only hiring the "trendiest" people.

  552. Were You Asked to Sign a Non-compete Agreement? Watch this first!

    Article In this video,  Michigan Ross Professor Norm Bishara shows you five simple steps to take before, and after, you sign...

  553. We tried the AI software companies like Goldman Sachs and Unilever use to analyze job applicants

    Video In this video, Business Insider explores HireVue, a new AI technology for screening job applicants. The video explains how HireVue...

  554. What Do Programmers Care About?

    Video In this video, Joel Spolsky from Stack Overflow speaks on 'What do top programmers really care about when looking for...

  555. What Happens When Employers Can Read Your Facial Expressions?

    Article This article outlines the risks of facial recognition technology. The authors outline three arguments that those against facial recognition technology...

  556. What happens when we work non-stop

    Article In this article, José Luis Peñarredonda discusses the experience of overworked workers, despite overwhelming evidence that working a healthy number of hours increases...

  557. What is a Hacker?

    Video This video is produced by The Media Show and has Mitch Altman as a guest to answer the question: What is a...

  558. What is an H-1B Visa?

    Video This video explains what an H-1B Visa is, its history, and critical opinions of H1-B visas.

  559. What is Burnout?

    Video In this video, Dr. Larissa Thomas, focusing mostly on physicians, covers the three main elements of burnout: emotional exhaustion, cynicism...

  560. What is Ethics?

    From the video description:  Ethics asks how we should live, what choices we should make and what makes our lives...

  561. What is the difference between Ethics, Morality and the Law?

    Video In this video, three different categories of demands on how we should live - ethics, morality, and law - are...

  562. What Liberals Get Wrong About Work

    Article In this article, Sandel argues that the American meritocratic mythos, lack of legal protections or recognition for manual laborers, and stagnated...

  563. What Money Can't Buy

    Book The description for this book is as follows: "In What Money Can't Buy, renowned political philosopher Michael J. Sandel rethinks the role...

  564. What Work is Really For

    Article In this essay, Professor Gary Gutting (who taught at the University of Notre Dame until 2019) approaches the question of...

  565. Whence and W(h)ither Technology Ethics

    Book The Oxford Handbook of Philosophy of Technology gives readers a view into this increasingly vital and urgently needed domain of...

  566. Where Do I Want To Work? Lecture Slides

    Lecture / slides In these lecture slides from the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre Dame,...

  567. Who controls the Internet?

    Article In this article, it attempts to answer the question "Who owns the internet". Decentralization means the Internet is controlled by...

  568. Who Spewed That Abuse? Anonymous Yik Yak App Isn’t Telling

    Article This article discusses the social media app Yik Yak. The article discusses how Yik Yak was founded on the principles of...

  569. Who Watches the Watchers? Lecture Slides

    Lecture / slides Slides for Lecture 23 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. In this lecture,...

  570. Why Are Young People Pretending to Love Work

    Article In this article, Griffith explores the phenomenon of "workaholism" in younger generations. She argues that this culture benefits those in...

  571. Why Cloudflare Let an Extremist Stronghold Burn

    Article This article highlights one example of the tricky balance between allowing free speech on the Internet while mitigating hateful content. Cloudflare...

  572. Why Doesn’t Silicon Valley Hire Black Coders?

    Article In this article, Vauhini Vara addresses the lack of representation of black coders at Google and why this occurs, looking specifically at...

  573. Why Edward Snowden Is a Hero

    Article In this article, the author expresses their opinion on why Edward Snowden is a hero. The article describes what Snowden's...

  574. Why Facebook is losing the war on hate speech in Myanmar

    Article In this article, Steve Secklow investigates why Facebook is failing to curb the spread of hate speech against ethnic minorities...

  575. Why hiring the ‘best’ people produces the least creative results

    Article In this article, Dr. Page argues that hiring the "best" people produces the least creative results. 

  576. Why I Put My Wife's Career First

    Article In this article, Andrew Moravcsik, husband of Anne-Marie Slaughter (who wrote this article about working mothers) describes his experience as a...

  577. Why is hiring broken? It starts at the whiteboard.

    Article In this article, open source extraordinaire Sahat Yalkabov explains why he has given up his search for a front end...

  578. Why Is Work so Boring?

    Video In this video, the School of Life argues that many people find work boring because they are forced to specialize....

  579. Why It Pays to Work Hard: Ted Talk

    Video In this video, Richard St. John proposes a simple shift in attitude to turn mediocre into incredible. Nothing comes easy, and...

  580. Why It's OK to Want to Be Rich

    Book From the book description:  "Finger-wagging moralizers say the love of money is the root of all evil. They assume that...

  581. Why Millennials Are Leaving Six-Figure Tech Jobs

    Video From the video description: "Tech jobs are known to have some of the most lavish benefits and perks, not to...

  582. Why Recent Grads Don't Negotiate

    Article In this article, Ross explores the reasons why recent grads choose not to negotiate job offers and why this may not be...

  583. Why Silicon Valley is Embracing Universal Basic Income

    Article This article describes how Universal Basic Income (UBI) works, and how it fits into Silicon Valley’s agenda. While some critics...

  584. Why Software is Eating the World

    Article In this article, Marc Andreessen argues that the rapid growth of tech companies will not lead to a dangerous new...

  585. Why Tech Is the Leading Industry on Parental Leave

    Article In this article, Bourree Lam profiles Etsy's updated parental leave policy from 12 weeks to 26 weeks. Lam cites two main...

  586. Why Tech Leadership Has a Bigger Race Than Gender Problem

    Article In this article, the findings of a new study from Ascend Leadership that there may be an overrepresentation of Asians in tech—but...

  587. Why the Future Doesn't Need Us

    Article From the article summary: "Bill Joy, cofounder and and chief scientist of Sun Microsystems, argues that the technologies of the future...

  588. Why the Open Code of Conduct Isn't For Me

    Article In this article, the author shares his opinion on GitHub’s new Open Code of Conduct. Specifically, the author critiques the...

  589. Why the STEM gender gap is overblown

    Article In this article, Denise Cummins explains that although women are just as capable of performing in STEM fields as men, this...

  590. Why The U.S. Government And Big Tech Disagree On Encryption

    Video This video has the following description: Encryption takes data like a text message or email and converts it into code to...

  591. Why Using an Ad Blocker Is Stealing

    Article In this article, the author discusses why using an ad blocker is stealing. The author argues that using an ad...

  592. Why Women Don't Code

    Article In this article, Stuart Reges discusses his opinion on why men and women are "different" and why these "differences" are responsible...

  593. Why Women Don’t Negotiate Their Job Offers

    Article In this article, the legitimate reasons women don't negotiate their salaries and how they can negotiate without a "social cost".

  594. Why Women Still Can't Have It All

    Article In this article, Anne-Marie Slaughter draws from her own professional experience to explain why it is incredibly hard for women...

  595. Why You Should Embrace Surveillance, Not Fight It

    Article From the article description: "The internet is a tracking and monitoring machine. We will ceaselessly self-track and be tracked. We’re expanding...

  596. Why You Should Stop Trying to Be Happy at Work

    Article Article summary written by the author:  "What are we really searching for when we say we want more “meaning” at...

  597. Women’s unpaid work must be included in GDP calculations: lessons from history

    Article In this article, Luke Messac argues that unpaid houshold labor should be included in calculations of GDP. Gross Domestic Product is a...

  598. WORK AND EMANCIPATORY PRACTICE: TOWARDS A RECOVERY OF HUMAN BEINGS’ PRODUCTIVE CAPACITIES

    Other The abstract for this paper is as follows:  This article argues that productive work represents a mode of human flourishing...

  599. Work and the Good Life Method (Selections from "Nicomachean Ethics")

    Philosophical Text In these excerpts from Aristotle's Nicomachean Ethics, he discusses what it takes to live a good life. Aristotle argues that, like...

  600. Working: People Talk About What They Do All Day and How They Feel About What They Do

    Book The description for this book is as follows: "Perhaps Studs Terkel’s best-known book, Working is a compelling, fascinating look at jobs and...

  601. Workism is Making Americans Miserable

    Article In this article, Derek Thompson outlines the new "workism" phenomenon. Despite predictions from 20th century intellectuals that Americans in the...

  602. Work-Life Balance

    Video In this video, The School of Life explains why work-life balance is impossible. They argue that our brains are generalists,...

  603. Writing Reflection 00: Ethical Frameworks

    Writing Reflection The first writing reflection assignment for Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The assignment asks...

  604. Writing Reflection 01: Jobs in the Tech Industry

    Writing Reflection The second writing assignment for Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The assignment asks...

  605. Writing Reflection 02: What does success look like?

    Writing Reflection In this writing reflection, students in Ethical and Professional Issues (in Notre Dame's Computer Science and Engineering department) are encouraged...

  606. Writing Reflection 03: Valuable Time and Good People

    Writing Reflection In this writing reflection from the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department, the students are encouraged...

  607. Writing Reflection 04: Social Media and the Internet

    Writing Reflection In this writing reflection, students in the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department...

  608. Writing Reflection 05: Exposure of Anonymity?

    Writing Reflection In this writing reflection for the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department, students are...

  609. Writing Reflection 06: The Very Weird Internet

    Writing Reflection In this writing reflection, students in the Ethical and Professional Issues course in Notre Dame's Computer Science and Engineering department...

  610. Writing Reflection 07: You've Been Canceled!

    Writing Reflection The eighth writing reflection for Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The writing reflection encourages...

  611. Writing Reflection 08: Artificial Perception

    Writing Reflection The ninth writing assignment for Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department.This assignment encourages students to...

  612. Writing Reflection 09: Face the Facts of AI

    Writing Reflection The tenth writing reflection for Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. This assignment asks...

  613. Writing Reflection 10: Hackers and Leakers

    Writing Reflection In this writing assignment for Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department, students are asked...

  614. Xbox's new Code of Conduct: yes to "get wrecked," "potato aim," no to hate

    Article In this article the author discusses Xbox's Code of Conduct, and in particular discusses Xbox's distinction between trash talk (acceptable) and harassment...

  615. You Must Change Your Life

    Article In this article, Hari Kunzru explains how the phenonemon of "executive athleticism" coupled with the remote working environment has caused tremendous amounts of...

  616. Young Chinese Bemoan Rat Race With Tongue-in-Cheek Memes

    Article This article describes Chinese memes about the country’s work culture that surfaced during the bleak job market of the COVID-19...

  617. Your Interview With AI

    Article This article discusses HireVue, an AI-based job hiring platform. The article discusses the ethical concerns surrounding HireVue and HireVue's responses to...

  618. You Should Plan On Switching Jobs Every Three Years For The Rest Of Your Life

    Article In this article,  Vivian Giang discusses why the stigma of being a flaky job-hopper is quickly becoming a thing of the...

  619. You Won't Believe What Obama Says In This Video!

    Video In this video, it appears as if Former President Barack Obama is delivering an important message. However, as the video...