CSci 300: Social Responsibility in Computer Science
Topic and Assignment Schedule
Random Integer
Sequence Generator
- Wed 26 Aug: Introduction to course
- Fri 28 Aug: No class meeting -- Prepare for next class
- Wed 2 Sep:
Course themes and approaches to ethics
- Preparing for class:
- Study Chapter 1 of Sara Baase's Gift of Fire. See
the course's Blackboard pages.
- Study Updates and Extras for A Gift of Fire Chapter 1.
- Prepare for Quiz 1 over chapter and
discussion of ethics concepts.
- In class: Discuss chapter and take Quiz 1.
- Fri 4 Sep: Ethical analysis and codes of ethics
- Preparing for class:
- Study the Ethical Analysis Framework.
- Study the Drinking on the Job Case.
- Examine the Association for Computing Machinery (ACM) Code of Ethics.
- In class: Discuss Ethical Analysis Framework, Drinking on the
Job Case Study, and ACM Code of Ethics.
- Related references on ethics:
- ACM/IEE-CS Software Engineering Code of Ethics and Professional Practice.
- IEEE
Code of Ethics.
- Online Ethics
Center for Engineering and Science. (This site has a number
of resources such as the Drinking on the Job case study.)
- Research Ethics, from the SHiPS Resource Center,
University of Minnesota.
- Wed 9 Sep: Privacy
- Preparing for class:
- Study Chapter 2 of the Blown to Bits textbook
(http://www.bitsbook.com/).
- Complete Assignment #1 described below.
- Assignment #1 description:
- Find a recent (e.g., 2013 or later) popular, technical, or
academic article about issues related to privacy (or security)
in the use of computing or communications technologies.
Choose something of interest to you personally and/or
professionally. I hope every individual will choose a
different article.
- Submit a document as Assignment #1 on
Blackboard that gives the full bibliographic
citation for the article and a one-paragraph
summary or critique of the article. The paragraph
should be written according to the usual scholarly standards and
be your personal work. Remember what you learned in
freshman composition class! Also remember the instructions I
gave on the syllabus about how to label assignments.
- Be prepared to deliver a brief oral report
(one-two minutes) on the issue(s) raised by he article, the
perspective it took, or why you considered this an important
article. I will call on a few students randomly.
- In class: Randomly selected students give brief oral
reports over their Assignment #1 papers. Class
then discusses these issues.
- Related references on privacy issues:
- American
Civil Liberties Union (ACLU).
- Center for Democracy and
Technology (CDT).
- Electronic Frontier Foundation
(EFF).
- Electronic Privacy Information Center (EPIC).
- Fri 11 Sep: Privacy (continued from above)
- Preparing for class:
- If you did not read Chapter 2 of Blown to Bits (http://www.bitsbook.com/) for
Wed, please read it.
- Be prepared to discuss the following issues: September 11
(today) is the 14th anniversary of the terrorist attacks on the
World Trade Center and Pentagon. How much are you willing to
give up privacy to achieve greater safety from such an attack
in the future? Has American society gone too far? not far
enough?
- Be prepared to discuss one or more of the issues from the
"Recent articles on privacy" below in class using the ethical analysis
framework (above).
- In class: Discuss issues described under Preparing for
Class.
- Recent articles on privacy issues:
- Right to be forgotten
- Wearable internet-of-things devices
- Matt Hamblen. As Smartwatches Gain Traction, Personal Data Privacy Worries
Mount, ComputerWorld, 22 May 2015.
- Michael Singleton. Defining Privacy in the Age of Wearable Cameras, The
Kernel, 14 Sep 2014.
- Roberto Hoyle, Robert Templeman, Steven Armes, Denise
Anthony, David Crandall, and Apu Kapadia. Privacy Behaviors of Lifeloggers Using Wearable Cameras, In
Proceedings of the 2014 ACM International Joint Conference
on Pervasive and Ubiquitous Computing (UbiComp '14), ACM,
New York, NY, USA, 571-582. DOI=10.1145/2632048.2632079 http://doi.acm.org/10.1145/2632048.2632079
- Privacy and security of social media data
- Student data privacy
- Wed 16
Sep: Intellectual Property
- Preparing for class:
- Study Chapter 6 of the Blown to Bits textbook
(http://www.bitsbook.com/).
- Using the above chapter and web resources below,
familiarize yourself with the concepts such as:
intellectual property, copyright,
patent, trademark, trade secret,
software license, open source, fair
use, public domain, etc.
(added 16 Sep) first-sale doctrine, reverse
engineering, software piracy, nondisclosure
agreement
- Be ready for Quiz 2 over these
intellectual property concepts.
- Be ready to discuss questions about intellectual
property such as (subject to changes and additions):
- Should software be free (in the political sense)?
- Should users/readers be required (via micro-payments) to
compensate items individuals place on "the web" when used by others
(e.g., blogs, personal websites, videos, social media pages,
software, etc.)?
- Should we be compensated for the use of data about us
collected by entities such as Google, Amazon, Facebook,
Kroger, etc.?
- In class: Discuss intellectual property concepts and take
Quiz 2.
- Related references on intellectual property:
- What is
Intellectual Property? by World Intellectual Property
Organization (WIPO).
- What is a Trade Secret? by World Intellectual Property
Organization (WIPO).
- Copyright and Fair
Use, Stanford University Libraries
Note: meaning of
"public domain" and "fair use".
- Bitlaw Legal
Resource, by Daniel A. Tysver.
- Making Sense of Software Licensing, by Ariel Gilbery-Knight,
TechSoup Global.
- Open source software
- (added 16 Sep) The University of Mississippi Department of Licensing
oversees the use of University copyrights, trademarks, logos,
scripts, images, etc. and licensing their use to other
organization and individuals.
- (added 16 Sep) Nondisclosure agreements, a form of contract to
protect trade secrets: NOLO Law for All, Wikipedia.
- (added 16 Sep) Software piracy, the unauthorized copying of
software in violation of licenses and/or copyright law: Webopedia.
- (added 16 Sep) Reverse engineering, extracting design information
about a product for the purpose of reproducing or enhancing it or
otherwise using the information in another design: Wikipedia, NC
State Ethics in Computing.
- Fri 18 Sep: No class meeting -- Gather ideas for
writing/updating your resume next week
- Wed 23 Sep: Job
search workshop conducted by Toni Avant, Director, Career Center,
and Dr. Lindsey Yaserer, Career Planning Specialist, School of
Engineering
- Assignment #2 due one week after workshop
- Write your resume appropriately for use in seeking jobs and
internships (such as in the Career Fair on 30 Sep).
- Submit an electronic copy via Blackboard before class on
30 Sep.
- Miscellaneous references for curriculum vitae
(CV) and resumes:
- Resume Tips for Computer Science Students, a blog post by
Patrick Cozzi.
- Curriculum Vitae, Colorado State University, The Writing Studio.
- Curriculum Vitae, by Alison Doyle, About.com Job Searching.
- Fri 25 Sep: No class meeting -- Work on Assignment
#2 defined above (i.e., resume) to turn in next class. Also
read the materials on Freedom of Speech identified below for next
class.
- Wed 30 Sep: Freedom of Speech (Expression)
- Preparing for class:
- Study chapters 7 and 8 of the Blown to Bits textbook
(http://www.bitsbook.com/).
- Study what freedom of speech means and its history (in
the USA and beyond) using related references below.
- Be prepared to discuss some of the questions below.
- In class: Discuss what freedom of speech/expression means and
its history. Organize Assignment #3 debate groups.
- Related references:
- Wikipedia, Freedom of
Speech.
- United States Courts, What does Free Speech Mean?
- English Bill of Rights, Article 9, adopted 1689 (Modern
History Sourcebook, Fordham University).
- U.S. Constitution, First
Amendent, part of the U.S. Bill of Rights, ratified 1791
(Legal Information Institute, Cornell University Law School).
- United Nations Universal Declaration of
Human Rights, adopted 1948.
- Beckman Center for Internet and Society, Harvard University
Law School, Freedom of Expression on the Internet.
- Defamation Law Made Simple
- Libel vs. Slander: Different Types of Defamation.
- Wikipedia, Common
carrier article.
- Discussion question related to freedom of speech/expression:
- How do we balance the conflict between freedom of speech
and protecting the vulnerable?
- Revisit the "Right to be forgotten" issue under Privacy
above from the perspective of free speech
- Should Edward Snowden be prosecuted?
- Is the control that companies like Google has over the
internet a threat to freedom of speech?
- Should there be net neutrality?
- Assignment #3 for 7 October: Exercise 3.4 from
Baase's A Gift of Fire (See handout or website.)
- Three groups of three-to-five volunteers. Each group will
take one of the parties in this case study (male student, female
student, University) and present its arguments in favor of the
position in a five-seven minute presentation in class on 7
October.
- Everyone else present a one-half to one page singlespaced
paper to either support one side or another or to analyze the case
from several perspectives. This will be due in Blackboard by
midnight on 11 October.
- Fri 2 Oct: No class meeting -- Work on Assignment
#3 described above.
- Wed 7 Oct: Freedom of speech (continued from above)
- Preparing for class:
- All students, study the issues surrounding
Assignment #3 described above.
- Debate groups, meet and prepare your presentations.
- Nonmembers of the debate groups, formulate your own
responses to the debate issues for your papers.
- In class: Debate/Trial about sexually oriented pictures on
website.
- After class: Nonmembers of debate groups, upload paper to
Blackboard by 11:59 p.m., Sunday, 11 October.
- Fri 9 Oct: No class meeting -- Work on Assignment #3 paper
- Sun 11 Oct: Assignment #3 paper due
- Wed 14 Oct: No class meeting (Dr. Cunningham hosting seminar speaker)
- Fri 16 Oct: No class meeting -- Prepare for next class
-
Wed 21 Oct: Errors, Failures, and Risks
- Preparing for class:
- Study Chapter 8 of Sara Baase's A Gift of Fire. See
the course's Blackboard pages.
- Study Updates and Extras for A Gift of Fire Chapter 8.
- Prepare for Quiz #3 over chapter.
- Consider and prepare to discuss the question in the Jason
Millar article on robot cars linked below.
- In class: Discuss chapter and take Quiz #3 over
chapter. Organize for the next assignment.
- Assignment #4 for the Therac-25 Mock Trials [description].
- Related references on errors, failures, and risks:
- Robotic vehicles
- Nancy G. Leveson. An Investigation of the Therac 25 Accidents, IEEE
Computer 26.7 (1993): 18-41.
[slides
by Catherine Schell]
- The Risks
Digest, Forum on Risks to the Public in Computers and
Related Systems, ACM Committee on Computers and Public Policy,
Peter G. Neumann, Moderator.
- Fri 23 Oct: Class time for Assignment #4 teams to meet
- Wed 28 Oct: Errors, Failures, and Risks (continued)
- Preparing for class: Each team expected to meet to prepare its
case for presentation in the next class.
- In class: Present Assignment #4 Therac-25 Mock
Trial cases.
- Fri 30 Oct: No class meeting
- Wed 4 Nov: Give and discuss Term Paper assignment
- Fri 6 Nov: No class meeting. Work on term paper.
- Wed 11 Nov: Guest speaker
Brian Young, Engineering Reference Librarian
- UM Williams Library CSci 300 Research Guide
- Other scholarly search engines and directories
- Avoiding plagiarism
- Instructor's Research Methods in Computer Science course website (with
material on scholarly communication and professional issues in
computer science education and research)
- Fri 13 Nov: Topic
Statement Due!. No class meeting -- Work on term paper
- Wed 18 Nov: No class meeting -- Work on term paper
- Fri 20 Nov: Term
Paper Due Soon! No class meeting
- Mon 23 Nov: Term
Paper Due at 8:00 a.m.
- Wed 25 Nov, Fri 27 Nov: Thanksgiving Break
- Wed 2 Dec: No class (No assessment exam)
- Fri 4 Dec: Closing Class Meeting
- Fri 11 Dec: No Final Exam (Term paper fills this role)
- Other materials not used Fall 2015
- A Vision of Crimes in the Future, TED talk by Marc
Goodman, TEDGlobal 2012, Edinburgh, Scotland
- The Best Stats You've Ever Seen, 2006 TED talk by Hans Rosling,
Karolinska Institute and GapMinder Foundation
[direct to video]
Copyright © 2015, H. Conrad Cunningham
Last modified: Mon Nov 30 14:20:20 CST 2015