References for DIMACS Tutorial on Social Choice and Computer Science References for Arnold Urken -------------------------------------------------------------------------------------- [1] Alberts, D.S., J.J. Garstka, and F.P. Stein, Network Centric Warfare, Washington: CCRP (1999). [2] Arrow, K. Social Choice and Individual Values. New Haven: Yale University Press, (1951). [3] Asch, S.E., and “Effects Of Group Pressure Upon the Modification and Distortion Of Judgment”, in: H. Guetzkow, ed., Groups, Leadership, and Men. Carnegie Press, Pittsburgh, 177- 190 (1951). [4] Beroggi, G.E.G. and W.A. Wallace, Operational Risk Management: The Integration of Decision, Communications, and Multimedia Technologies. Boston: Kluwer Academic Publishers (1998). [5] Brams, S. and P. Fishburn. Approval Voting, Birkhäuser, Boston, MA, (1983). [6] Brown, B., N. Green, and R. Harper, eds., Wireless World: Social and Interactional Aspects of the Mobile Age. London: Springer Verlag (2002). [7] Compagnoni, A. and H. Goguen, “Typed Operational Semantics for Higher Order Subtyping,” Information and Computation”, vol. 182, no. 2, (2003). [8] Condorcet, J.A.N. Marquis de, Essai sur L'application de l'analyse à la Probabilité des Décisions Rendues à la Pluralité des Voix, Paris (1785). [9] Dennis, A., J. Nunamaker, Jr., and D. Paranka, D. “Supporting the Search For Competitive Advantage”, in: Journal of Management Information Systems vol. 8, 5 – 36 (1991). [10] DeSanctis, G. and R.B. Gallupe, “A Foundation For the Study Of Group Decision Support Systems”, in Management Science, vol. 33, 589 – 609 (1987). [11] Dix, A., A. Howes, and S. Payne “Post-Web Cognition: Evolving Knowledge Strategies For Global Information Environments”, International Journal of Web Engineering Technology, vol. 1, no. 1, 2003. [12] Dufner, D., S.R. Hiltz, K. Johnson and R. Czech, “Distributed Group Support: Effects of Voting Tools on Group Perceptions of Media Richness”, Group Decision and Negotiation, vol. 4, 235 –250 (1995). [13] Falcone, R., M. Singh, and Y.H. Tan,. eds., Trust in Cybersocieties: Integrating the Human and Artificial Perspectives, New York: Springer Verlag (2001). [14] Fischer, M. J., Lynch, N. A., and Paterson, M. S. Impossibility Of Distributed Consensus With One Faulty Process,'' Journal of the. ACM 32, 2, April, 1985, 374--382. [17] Frater, M.R. Electronic Warfare for the Digitized Battlefield, Norwood: Artech House, Inc. (2001). [18] Gallupe, R.B.and G. DeSanctis, “Computer-Based Support For Group Problem-Finding: An Experimental Investigation”, MIS Quarterly 277 – 296 (1988). [19] Gavish, B., and J.H. Gerdes, Jr., “Voting Mechanisms and their Implications in a GDSS Environment.” Annals of Operations Research, vol. 71, 41 – 74 (1997). [20] Gavish, B., J. Gerdes and S. Sridhar, “CM3, A Distributed Group Decision Support System”, IIE Transactions, (1995). [21] Gavish, B., J. Gerdes and S. Sridhar, “CM3, Looking Into the Third and Fourth Dimensions Of GDSS”, in: Integration: Information and Collaboration Models, S.Y. Nof, ed., Kluwer Academic, NATO ASI Series, 269 – 299 (1999). [22] George, J., J. Nunamaker, Jr. and D. Vogel, “Group Decision Support Systems and Their Implications For Designers and Managers: The Arizona Experience”, Transactions of the 8th International Conference on Decision Support Systems, Boston, MA, 13 – 25, (1988). [23] Gray, P, Alter, S., DeSanctis, G., Dickson, G., Johansen, R., Kraemer, K., Olfman, L. and Vogel, D. “Group Decision Support Systems”, in Stohr, E. and Konsynski, B., Information Systems and Decision Processes, IEEE Computer Society Press,75-136, 1992.. [24] Grofman, B., “Judgmental Competence Of Individuals and Groups in Binary Choices”,. Journal of Mathematical Sociology (1976). [25] Grofman, B., G. Owen, and S. Feld, “Thirteen Theorems in Search of Truth”, Theory and Decision (1986). [26] Hiltz, S.R., and M. Turoff, “Structuring Computer-Mediated Communication Systems to Avoid Information Overload”, Communications of the ACM, vol. 28, 680– 689 (1985). [27] Hunter, R. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing, New York: J. Wiley & Sons (2002). [28] Jiang, B. “Risk Management and the Office Of Homeland Security's Antiterrorism Tasks”, The Online Journal of Peace and Conflict Resolution, vol. 4, no. 2, (2002). [29] Kirn, S. “Cooperative Knowledge Processing: the Key Technology for Future Organizations”, Working Paper 39, University of Münster, Institute of Business Informatics (1995) [30] Kirn, S. and G. O’Hare, Cooperative Knowledge Processing, London: Springer-Verlag, 2002. [31] Konsynski, B., E. Stohr, and J. McGee, “Review and Critique Of DSS. In E. Stohr, and B. Konsynski, in: Information Systems and Decision Processes, IEEE Computer Society Press, 7-27 (1992). [32] Korhonen, P., H. Moskowitz, J. Wallenius and S. Zionts, An Interactive Approach To Multiple Criteria Optimization With Multiple Decision-Makers, Naval Research Logistics Quarterly 33(1986)589 –602. [33] Kramer, R. M. “Trust Rules for Trust Dilemmas: How Decision Makers Think and Act in the Shadow of Doubt”, in Falcone, R., Singh, M. and Tan, Y.H. eds., Trust in Cybersocieties: Integrating the Human and Artificial Perspectives, New York: Springer Verlag (2001). [34] Lamport, L., R. Shostak, and M. Pease, “The Byzantine Generals Problem”,. ACM Transactions on Programming Languages and Systems, Vol. 4, (1982). [35] Ludwin, W.B., “Strategic Voting and the Borda Method”, Public Choice, vol. 33, 85 – 90 (1978). [36] Mackenzie, D. “May the Best Man Lose”, Discover, November, 2000. [37] McLean, I. and A.B. Urken, eds., Classics of Social Choice, Ann Arbor: University of Michigan Press (1995). [38] National Research Council, Making the Nation Safer: The Role Of Science and Technology In Countering Terrorism, Washington (2002). [39] National Research Council. Computing in the Information Age. Washington, 1990. [40] Niemi, R.G. and W.H. Riker, “The Choice Of Voting Systems”, Scientific American (1976). [41] Nitzan, S. and Paroush, J., Collective Decision Making: An Economic Outlook, Cambridge University Press (1985). [42] Nunamaker, J., A. Dennis, J. Valacich, D. Vogel, and J. George, “Electronic Meeting Systems To Support Group Work. Communications of the ACM, vol. 7, 40—61 (1991). [43] Parhami, B. “A Taxonomy Of Voting Schemes For Data Fusion and Dependable Computation”, Reliability Engineering and System Safety, vol. 52, 139-151 (1996). [44] Pinkham, R.S. and A.B. Urken, “Computer Simulation Of Interactive Voting Processes”, Working Paper (1991). [45] Rancich, T., “Combating Terrorism”, U.S. Naval Institute Proceedings, vol. 126, no. 11, 66-69 (2000). [46] Riker. W.H. Liberalism Against Populism, San Francisco: Freeman (1982). [47] Rogers, P. Protecting America Against Cyberterrorism. Federal Bureau of Investigation (2002). [48] Saari, D., “The Borda Dictionary”, Social Choice and Welfare, vol. 7, 279 – 317 (1990) [49] Sabelfeld, A. and Myers, A.C., “Language-Based Information-Flow Security”, IEEE Journal on Selected Areas in Communications, vol.21,no. 1 (2003). [50] Schneider, F.B., G. Morrisset, and R. Harper, “A Language-Based Approach To Security”, in R. Wihelm ed., Informatics: 10 Years Back, 10 Years Ahead,, Lecture Notes in Computer Science, Volume 2000 Springer-Verlag, Heidelberg, (2000). [51] Shapley, L. and B. Grofman, “Optimizing Group Judgmental Accuracy in the Presence of Interdependencies”, Public Choice (1984). [52] Urken, A.B., “Voting In A Computer Networking Environment”, In: C. Gould ed., The Information Web: Ethical and Social Implications Of Computer Networks, Westview Press, Boulder (1987). [53] Urken, A. B., “Social Choice Theory and Distributed Decision Making”, in R. Allen, ed., Proceedings of the International Conference On Office Information Systems. Palo Alto: IEEE/ACM (1988). [54] Urken, A.B., “Coordinating Agent Action Via Voting”, Proceedings of the International Conference on Office Information Systems, Palo Alto: IEEE/ACM (1990). [55] Urken, A.B., “The Condorcet-Jefferson Connection and the Origins of Social Choice Theory, Public Choice (1991). [56] Urken, A.B., “Individual and Group Competence Under Approval Voting: A Paradox”, Working Paper (1991). [57] Urken, A.B., “Using Revealed Preference Metrics To Improve System Management”, Proceedings of the International Conference on Complex Systems Integration, Stevens Institute of Technology, (2003). [58] Whitaker, R., “GDSS Formative Fundamentals: An Interpretive Analysis”,. CSCW: An International Journal, vol. 2, no. 4, 241-262 (1994). [59] Winograd, T., and Flores C. F. Understanding Computers and Cognition: A New Foundation For Design. Norwood, NJ: Ablex, 1986. [60] Young, H.P., “Social Choice Scoring Functions”, SIAM Journal of Applied Mathematics, vol. 28, 824—838 (1975)