Main | Syllabus | Readings | Assignments | Lectures | Tests

CIS 490/590 Computer Ethics

Spring 2013

Overall Text references for Course:
H. Abelson, K. Ledeen & H. Lewis "Blown to Bits" 2008. Available as free PDF download (Creative Commons) or as purchase according to your conscience.
[ http://www.bitsbook.com/]

L. Lessig, "Code v.2" 2006. Available as free PDF download (Creative Commons) or as purchase according to your conscience.
[ http://codev2.cc/]


Week Topic Reading URL
1 Computing History and the Information Age

REQUIRED for Thursday discussion: Code v.2, Chapter 3;
Optional: Blown to Bits, Chapter 1; Code v.2, Chapter 4
available from websites listed above
2 Ethics: Theories, Analysis and Decision making Santa Clara University, Markkula Center for Applied Ethics (Examine all links on this page) www.scu.edu/ethics/practicing/decision
Ethics: Theories, Analysis and Decision making REQUIRED reading: IBM and the Holocaust - Wikipedia en.wikipedia.org/wiki/IBM_and_the_Holocaust
3 Networks: Freedom of Expression Optional reading: Blown to Bits, Chapter 7; Code v.2, Chapter 12 available from websites listed above
Free Expression: Consequences and Limits on Networks REQUIRED reading: Rape in Cyberspace - Wikipedia en.wikipedia.org/wiki/A_Rape_in_Cyberspace
Free Expression: Consequences and Limits on Networks Optional reading: original article "A Rape in Cyberspace" by Julian Dibbell in the Village Voice in 1993 www.juliandibbell.com/texts/bungle_vv.html
Free Expression: Consequences and Limits on Networks Optional reading: Virtual(ly) Law: The Emergence of Law in LambdaMOO by Jennifer L. Mnookin jcmc.indiana.edu/vol2/issue1/lambda.html
4 Privacy Optional reading: Blown to Bits, Chapter 2; Code v.2, Chapter 11 available from websites listed above
Optional reading: "Can I get some privacy", by Brian Eule, Stanford Magazine, March/April 2013 Privacy-StanfordMag 3-2013.pdf
PRIVACY: How changes in technology affect privacy issues REQUIRED reading: "Facebook Announces Home, a Homescreen Replacement Android App Designed around People", by Josh Constine, TechCrunch, April 4, 2013 Facebook-Home.pdf
PRIVACY: How changes in technology affect privacy issues Optional reading: Facebook Privacy Policy Facebook Privacy Policy
5 Intellectual Property Optional reading: Blown to Bits, Chapter 6; Code v.2, Chapter 10 available from websites listed above
INTELLECTUAL PROPERTY: How can we own software ideas? REQUIRED reading: various articles on Apple Inc. v. Samsung Electronics Co., Ltd. All Things Digital article
REQUIRED reading: various articles on Apple Inc. v. Samsung Electronics Co., Ltd. Seattle blog article
REQUIRED reading: various articles on Apple Inc. v. Samsung Electronics Co., Ltd. Wikipedia article
REQUIRED reading: various articles on Apple Inc. v. Samsung Electronics Co., Ltd. Patent for Pinch-to-Zoom
6 Who owns information? See Optional readings for week 4 on Privacy
REQUIRED reading: the Highlight app Highlight website
REQUIRED reading: "Location-sharing app Highlight gets biggest update since launch", by Emily Price, July 19, 2012 Mashable.com website
REQUIRED reading: "Sneaky Apps that Track Cellphones", New York Times, Dec 23, 2012 pdf download
7 Computer Security Optional reading: Blown to Bits, Chapter 5 available from website listed above
REQUIRED reading: Anonymous - Wikipedia en.wikipedia.org/wiki/Anonymous_(group)
REQUIRED reading: "Anonymous hackers launch massive cyber assault on Israel Cyberspace, #OpIsrael", April 7, 2013 The Hacker News website
REQUIRED reading: "Anonymous and Rehtaeh Parsons: Group Slams Suspects’ Supporters, Makes Demands", April 19, 2013 The Huffington Post website
REQUIRED reading: YouTube broadcast from Anonymous, April 12, 2013 YouTube website
REQUIRED reading: "Canada reopens Rehtaeh Parsons rape case following Anonymous involvement", April 13, 2013 RT.com website
REQUIRED reading: "17-year-old alleged Anonymous Hacker charged for unauthorized access", April 15, 2013 The Hacker News website
8 Software Reliability and Professional Ethics REQUIRED: Therac-25 Case computingcases.org website
8 REQUIRED: Association for Computing Machinery (ACM) Code of Ethics ACM website
8 REQUIRED: ACM/IEEE Software Engineering Code of Ethics ACM website
9 Global Issues of the Internet Optional reading: Code v.2, Chapter 15 available from website listed above
REQUIRED reading: "Will the Internet End Up Controlled by Big Business and Politicians?", Dec 24, 2012 Guardian UK
REQUIRED reading: "A Web world without borders", March 3, 2013 Foreign Policy magazine
REQUIRED reading: "Prosecution of Anonymous Activists Highlights War for Internet Control", November 12, 2012 Guardian UK
10 AI, Robotics and Moral Machines REQUIRED reading: "The Future of Moral Machines" by Colin Allen, Dec 25, 2011; NY Times Opinion Pages NY Times website
REQUIRED reading: "Do Drones Undermine Democracy", by Peter Singer, January 19, 2013 NY Times NY Times pdf
REQUIRED reading: "World's most human-like android head", April 26,2013, KurzwielAI.net KurweilAI.net pdf