US Patent 6,085,192 System and Method for Securely Synchronizing by fL3DlI

VIEWS: 0 PAGES: 3

									                             Capstone Computer Ethics Assignment
                                                   (5% of grade)

Assignment
        Assignment – students select topic in computer ethics and write a one page paper. 3 minute presentations
         in class. An assessment quiz that follows a week later will assess student comprehension.
        Due – post your paper on your individual Capstone I website and send softcopy to cwt@uark.edu by
         10/13/09. Presentation in class 10/13/09. Quiz in class 10/20/09.
        Topic category – select a topic related to one of the program outcomes below. See examples below. The
         idea is to specialize a topic to the computing area – e.g., what whistle blowing means in the computing area.
        Paper (80%, .doc) – 1-page, single-spaced, topic title, your name/course/semester, headings, 3 or more
         references, 3 questions. No plagiarism (copying words or ideas not your own w/o proper attribution)
        Questions (20%, append to paper) – each paper will include 3 exam questions that you make up: short
         answer, multiple choice or T/F – include answers. Questions should be thoughtfully constructed. Someone
         who reads your paper or hears your presentation should be able to answer the questions but answers should
         not be obvious to someone unfamiliar with the topic.
        Note: student papers will be available to other students so aim for high quality.

CS/CE Program Outcomes, Subcategories, & Topic Examples (not comprehensive)
        Ethical responsibilities esp. Computer Ethics
             o Professional responsibilities
                       Codes of Ethics from ACM and IEEE – covered in SDC
                       Obligations of a professional
                       Whistle blowing
                       Discrimination, harassment
                       Dependence on computers
                       Conflict of Interest – identify and resolve, avoid appearance
             o Privacy
                       Invasion of Privac, PII, identity theft
                       Privacy legislation in Europe vs US
                       RFID privacy issues, e.g., tracking, chipping (embedded in human)s, in passports
                       Cookies, spyware
                       Privacy assurance mechanisms
                       P3P
                       Spam filters
                       Data spills
                       Anonymity
                       Discovery (legal procedure)
                       Plagarism Detection Software
                       Confidentiality, Integrity, Data quality
             o Risks and liabilities of computer-based systems
                       Safety
                                Therac-25 case
                                Computer Addiction Awareness
                       Reliability
                                Software disasters, risk management
                       Environmental concerns
                                Recycling computers and parts
             o Civil liberties
                       Free speech, Censorship
                                Role of the Internet in different countries
                                Hate speech
                                Limiting online speech on campus



4/1/07                                                    1
                                Communications Decency Act
                                Encryption controversy
                      Big Brother
                                Video surveillance
                                Corporations monitoring employee email and web usage
                                Need to know => need to share
             o   Intellectual property
                      Software, music, … piracy
                      Patent process including provisional patents, infringement
                      Patenting business methods
                      Copyright and Freedom of Expression
                      Fair use
                      Digital rights management
                      The David LaMacchia Case
                      Use of personally owned software on company computers
             o   Ethical issues in AI, DBMS, Software Engineering, …
                      Introductory programming
                                Freedom of speech
                                Exploring Computer Security
                      Networking
                                Networked world
                                Web browsers and security issues
                                Viruses, worms
                                Distance learning
                                Netiquette
                      Software Engineering
                                Software maintainability
                                Designing safety critical system
                                Ethical implications of inaccurate simulations
                      Operating systems
                                Introduction to Hacking and Cracking
                                Operating system security through design
                      Human Computer Interfaces
                                Ethics in Ergonomics
                                Helping People With Disabilities to Use Their Computers
                      Database Management
                                Data Mining and Statistical Inference
                      Artificial Intelligence
                                Turing test
             o   Application areas
                      Daily life
                      Medical information systems
                      Electronic government including Voting
                      Information warfare

Resources – many more are available at the library or online
        Books on Computer Ethics
            o R. Spinello, Cyberethics: Morality and Law in Cyberspace, Jones and Bartlett, 2006
            o G. Stamatellos, Computer Ethics: A Global Perspective, Jones and Bartlett Publishers, 2007
            o Search on Amazon for “computer ethics”
            o K. Himma, Internet Security: Hacking, Counterhacking, and Society, Jones and Bartlett
                 Publishers, 2007
        Websites on Computer Ethics – search online for “computer ethics”
            o http://en.wikipedia.org/wiki/Computer_ethics



4/1/07                                                2
         o   http://plato.stanford.edu/entries/ethics-computer/
         o   http://www.onlineethics.org/topics/comethics.html
         o   http://www-swiss.ai.mit.edu/6095/readings-crime.html#cases
         o   http://www.npr.org/templates/story/story.php?storyId=4464216
         o   http://ethics.sandiego.edu/Applied/Computing/index.asp
         o   http://www.comphist.org/computing_history/new_page_5.htm
         o   http://compserv.uark.edu/policies/
         o   http://www.sigcse.org/cc2001/SP.html
         o   http://www.apa.udel.edu/apa/archive/newsletters/v97n2/computers/tavani.asp
         o   http://homepage.mac.com/planclos/ethics/index.html
         o   http://www.aaai.org/AITopics/html/ethics.html
         o   http://cyberethics.cbi.msstate.edu/biblio/
         o   http://cyberethics.cbi.msstate.edu/
         o   http://www.rivier.edu/faculty/htavani/biblio.htm
         o   http://www.cpsr.org/
         o   http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=644928
         o   http://www.acm.org/constitution/code.html
         o   http://www.emr.org/linksUCE.html
         o   http://www.stanford.edu/class/cs201/
         o   http://computingcases.org/
         o   http://www2.okbu.edu/business/faculty/chanchey/ethicsurls.htm
         o   http://www.cs.sunysb.edu/ProfessionalEthics.html




4/1/07                                             3

								
To top