Baaklini, A. I. and J. J. Heaphey, eds.  1977.  Comparative Legislative
    Reform and Innovations.  Albany, NY:  Comparative Development Studies
    Center.  Cited in Frantzich, 1982.
 
Babbage, Charles. 1982. Cited in Philip Kraft, Butler-Lox Foundation
    Lecture.  Davos, Switzerland.
 
Babbage, Charles. 1832.  On the Economy of Machinery and Manufactures. 
    London:  Charles Knight.
 
Babcock, Charles.  1985.  "On-Line Crime Suspect System Implicated in 
    False Arrest," Computerworld (Aug. 19):12.
 
Bacon, Donald C., and Orr Kelly.  1978.  "Uncle Sam's Computer Has Got
    You,"U. S. News and World Report (April 10).
 
Bairstow, Jeffrey N.  1985.  "Chip Design Made Easy:  A New Generation of
    Tools Enables Nonexperts to Design Custom Integrated Circuits Cheaply
    and Easily," High Technology 5,6 (June):18-25.
 
Balshem, Martha.  1984.  Study reported in The Chronical of Higher
    Education (November 28):5.
 
Bander, Edward, and Susan Sweetgall.  1983.  "Westlaw and Lexis:  A
    Comparison," in New Technology and Law, Spring issue of The Advocate
    14,2:9-12.
 
Barash, David.  1979.  The Whisperings Within:  Evolution and the Origin of
    Human Nature.  New York:  Penguin.
 
Barcomb, David. 1981. Office Automation: A Survey of Tools and Techniques.
    Maynard, MA: Digital Press.
 
Barnaby, Frank.  1982.  "Microelectronics in War" in Gunter Friedrichs and
    Adam Schaff, eds.  Microelectronics and Society:  For Better or For
    Worse.  New York:  Permagon Press.
 
Barnes, J.G.P.  1982. Programming in Ada.  Reading, MA:  Addison-Wesley.
 
Barnett, Richard, and Ronald E. Muller.  1974.  Global Reach. New York:
    Simon and Schuster.
 
Barr, Avron, and Edward A. Feigenbaum.  1982.  The Handbook of Artificial
    Intelligence.  Stanford:  Heuris Tech Press.
 
Bartolik, Peter.  1984.  "First conviction, jail term given for copyright
    violations,"Computerworld (August 6):14.
 
Basden, A.  1984.  "Application of Expert Systems," pages 59-75 in Coombs,
   Developments in Expert Systems.
 
Bateson, Gregory. 1972.  Steps to an Ecology of Mind.  NY:  Chandler.
 
Batt, Robert.  1984a.  "Fingerprint ID System Quick to Solve Criminal
    Cases," omputerworld (March 19):25-26.
 
            .  1984b.  "U.S. Officials Decry Japanese Copyright Plan,"
   Computerworld (March 19):100.
 
Baum, Julian.  1985.  "New Law in China to protect patents," Boston 
    Globe (March 24):A97,A99.
 
Becker, George.  1978.  The Mad Genius Controversy.  Beverly Hills, CA: 
    Sage.
 
Beeler, Jeffry.  1985.  "NCR user wins $5.8 million suit' Computerworld
    (June 3):1.
 
Begley, Sharon, with Robb A. Allan.  1983.  Can Ada Run the Pentagon?
    Newsweek, January 10:71.
 
Belkin, Gary S., and Norman Goodman. 1980. Marriage, Family, and Intimate
    Relationships.  Chicago:  Rand McNally.

Bell, C. Gordon.  1984.  "The Mini and Micro Industries," Computer
    (October):14-34.
 
Bell, Daniel. 1981. "The Social Framework of the Information Society," in
    Michael L. Dertouzos and Joel Moses. The Computer Age: A Twenty-Year
    View. Cambridge, MA: MIT Press, 1883:163-211.
 
Bell, Daniel.  1980.  "The Return of the Sacred?" in The Winding Passage. 
    NY: Basic Books.
 
Bell, Daniel.  1973.  The Coming of Post-Industrial Society.  New York:
    Basic Books.
 
Bendix, Reinhard. "Legal Domination: the Emergence of Legal Rationality,"
    in Max Weber: An Intellectual Portrait. 1977. University of California
    Press, Berkeley.
 
Bendix, Reinhard, and Seymour Martin Lipset, eds. 1966. Class, Status, and
    Power. NY:  Free Press.
 
Benedict, Ruth.  1934.  Patterns of Culture.  Boston:  Houghton Mifflin.
 
Bennett, William J.  1985.  "Why We Should Cut Federal Aid," interview in
   Newsweek on Campus (April):21.
 
Benoit, Ellen. 1984. "Black Box Taxation,"Forbes (August 27):66.
 
Berg, Ivar.  1970.  Education and Jobs:  The Great Training Robbery.  New
    York:  Praeger.
 
Berger, Peter.  1969.  A Rumor of Angels.  NY:  Doubleday.
 
Berger, Peter, Brigette Berger, and Hansfried Kellner.  1973. The Homeless
    Mind. Random House: NY.
 
Berglas, Steven. 1984. Interview in The Boston Globe.  February 6:34.
 
Bernal, J. D.  1939.  The Social Function of Science  London:  Routledge
    and Kegan Paul.
 
Bertoni, Phil.  1983.  Can defense computers be tricked?  The Boston Globe,
    July 11:37.
 
Betts, Mitch.  1985a. "Focus of NIOSH VDT Study Under Fire," Computerworld.
    January 14:2.
 
           .  1985b.  "NIOSH to Study Mental Stress Related to Computer
    Work," Computerworld, February 4, 1985.

           .  1985c.  "VDT Shield Introduced," Computerworld (March 11):9.
 
           .  1985d.  "House Report Recommends no Federal VDT Regulation,"
    Computerworld, (September 6):26.
 
           .  1985e.  "Federal DP Crooks Profiled," Computerworld (July
    1):2
 
           .  1985f.  "Copyright Office Inquiry Targets Electronic Data
    Bases," Computerworld (June 24):24.
 
            .  1984.  "Recent computer crime legislation viewed as first
    step," Computerworld (October 22):11.
 
Binford, Lewis R.  1984.  Faunal Remains from Klasies River Mouth. 
    Orlando, FL:  Academic Press.
 
Binning, Gerd, and Heinrich Rohrer.  1985. "The Scanning Tunneling
    Microscope," Scientific American 253,2(August):50-56.
 
"Biochips:  Can Molecules Compute?"  1984.  High Technology (February
    4):36.
 
Birren, Faber.  1978.  Color and Human Response.  New York:  Van Nostrand.
 
Blauberg, I. V., V. N. Sadovsky, and E. G. Yudin.  1977. Systems Theory:
    Philosophical and Methodological Problems.  NY:  Progress Publishers.
 
Blauner, Robert.  1964.  Alienation and Freedom:  The Factory Worker and His
    Industry.  Chicago:  University of Chicago Press.
 
"Blind 'See' Tactile Screen." 1983. Science Digest, November:37.
 
Bloombecker, Jay, ed. 1984. The Computer Crime Law Reporter.  Los Angeles: 
    California State University.
 
BLS Handbook of Methods, Vol I. U.S. Dept. of Labor, Bureau of Labor
    Statistics, December 1982. Bulletin 2134-1.
 
Blum-West, Steve, and Timothy J. Carter.  1983. "  Bringing White-Collar
    Crime Back In:  An Examination of Crimes and Torts,"   Social Problems
    30,5:543-554.
 
Bluestone, Barry and Bennett Harrison. 1982. The Deindustrialization of
    America. New York: Basic Books.
 
Blum, Harold F. 1968. "Order, Negentropy, and Evolution," in Time's Arrow
    and Evolution.  Princeton, NJ:  Princeton University Press.
 
Boden, Margaret.  1977.  Artificial Intelligence and Natural Man.  New
    York:  Basic Books.
 
Boel, Harold, and Gustave M. Hauser. 1984.  "Pro and Con:  Should CATV Move
    Data Down the Pipes," Computerworld on Communications 18, 36A (Sept.
    5):7-9.
 
Bok, Derek.  1985. "The President's Report," (March). Cambridge, MA: 
    Harvard University.
 
Bolt, Richard A. 1985. "Conversing With Computers," Technology Review
    (February/March): 34-43.
 
Bombeck, Erma.  1982.  "Keeping Women at Home."  The Boston Globe, August
    19:66.
 
Bonham, George W. 1983.  Computer Mania:  Academe's Inadequate Response to
    the Implications of the New Technology.  The Chronicle of Higher
    Education, March 30:72.
 
Borges, Ron.  1983.  "Computer 'run' is now the NFL's best play," The
    Boston Globe (Dec. 26):49-51.
 
Boserup, Ester. The Conditions of Agricultural Growth. Chicago: Aldine,
    1965.
 
Bottomore, T.B. 1966.  Classes in Modern Society.  NY:  Pantheon.
 
              , ed.  1964.  Karl Marx:  Selected Readings in Sociology and
    Social Philosophy.  NY:  McGraw-Hill.
 
                   .  1963.  Karl Marx:  Early Writings.  NY:  McGraw-Hill.
 
Boulding, Kenneth E.  1981.  "Commodities as an Evolutionary System,"
    chapter 2 of Evolutionary Economics.  Beverly Hills, CA:  Sage.
 
Bourne, Charles P.  1977.  "Computer-based Reference Service as an
    Alternative Means to Improve Resource Poor Local Libraries in
    Developing Countries," International Library Review 9:43-50.
 
Bowles, Samuel, and Herbert Gintis.  1976.  Schooling in Capitalist
    America:  Educational Reforms and the Contradictions of Economic Life.
    New York:  Basic Books.
 
Braidwood, Robert J. "The Agricultural Revolution." Scientific American.
    September 1960. 203, 3: 130-148.
 
Brand, Stewart, Kevin Kelly, and Jay Kinney.  1985.  "Digital Retouching: 
    The End of Photography as Evidence of Anything," Whole Earth Review 47
    (July):42-50.
 
Branscomb, Anne W. 1983. "Communication Policy in the United States:
    Diversity and Pluralism in a Competetive Marketplace," in Patricia
    Edgar and Syed A. Rahim, eds. Communication Policy in Developed
    Societies.  Boston:  Kegan Paul International.
 
Braudel, Fernand.  1981.  The Structures of Everyday Life:  Civilization
    and Capitalism, 15th - 18th Century.  New York:  Harper and Row.
 
Braun, Ernest, and Stuart McDonald. 1978. Revolution in Miniature:  The
    History and Impact of Semiconductor Electronics.  London: Cambridge
    University Press.
 
Braverman, Harry. 1974. Labor and Monopoly Capital: the Degradation of Work
    in the Twentieth Century. NY: Monthly Review Press.
 
Bright, Joseph. The Boston Globe. (September 4, 1983).
 
Brod, Craig. 1984. Technostress.  Reading, MA:  Addison-Wesley.
 
Brooks, Frederick P. Jr.  1982.  The Mythical Man-month:  Essays on
    Software Engineering.  Reading, MA:  Addison-Wesley.
 
Brownstein, Henry H. 1984. "How I Contacted a Human Form Through My
    Computer," The Humanist Sociologist 9,4 (December):5-7.
 
Bruner, Jerome S.  1966.  Toward a Theory of Instruction.  Cambridge, MA:
    Harvard University Press.
 
                .  1962.  On Knowing:  Essays for the Left Hand. 
    Cambridge, MA:  Belknap Press.
 
Brutzkus, E. 1980. "The Technological Advance Beyond the Optimum,"Ekistics
    47(September):384-389.
 
Buckley, Walter.  1967.  Sociology and Modern Systems Theory.  Englewood
    Cliffs, NJ:  Prentice-Hall.
 
Bulkeley, William M. "Software Firms Urge Big Buyers to Curb Illegal
    Copying of Programs by Employees" Wall Street Journal, Oct. 23, 1984:
    31.
 
"Bulletin Boards Target of Crime Legislation?" 1985.  Computerworld (July
    1):  23.
 
Burch, John L., ed. 1984. Computers:  The Non-Technological (Human)
    Factors:  Recommended Reading List on Computer Ergonomics and User-
    Friendly Design.  Lawrence, KA:  The Report Store.
 
Burnham, David. 1985. "Computer Called Peril to U.S. Record Keeping," 
    The New York Times (March 6):A11.
 
              . 1984.  "FBI may test computer index for white-collar crime
    inquiries," New York Times, October 25:A1,B17.
 
              . 1983.  The Rise of the Computer State.  New York:  Random
    House.
 
Burton, K. 1985.  "Studies relate birth defects to high-tech toxins in
    water," Computerworld (January 28):84.
 
Bushnell, Davis.  1985.  "Texext's Technology aimed at Publishing," The
   Boston Globe (August 19):34-36.
 
Butner, Marion. 1982.  Computerized big brother:  from a German
    perspective, Science for the People 15,2 (March/April):6-13.