Overall Text references for Course:
H. Abelson, K. Ledeen & H. Lewis "Blown to Bits" 2008. Available as free PDF download (Creative Commons) or as purchase according to your conscience.
[ http://www.bitsbook.com/]
L. Lessig, "Code v.2" 2006. Available as free PDF download (Creative Commons) or as purchase according to your conscience.
[ http://codev2.cc/]
Week | Topic | Reading | URL |
---|---|---|---|
1 | Computing History and the Information Age |
REQUIRED for Thursday discussion: Code v.2, Chapter 3; Optional: Blown to Bits, Chapter 1; Code v.2, Chapter 4 |
available from websites listed above |
2 | Ethics: Theories, Analysis and Decision making | Santa Clara University, Markkula Center for Applied Ethics (Examine all links on this page) | www.scu.edu/ethics/practicing/decision |
Ethics: Theories, Analysis and Decision making | REQUIRED reading: IBM and the Holocaust - Wikipedia | en.wikipedia.org/wiki/IBM_and_the_Holocaust | |
3 | Networks: Freedom of Expression | Optional reading: Blown to Bits, Chapter 7; Code v.2, Chapter 12 | available from websites listed above |
Free Expression: Consequences and Limits on Networks | REQUIRED reading: Rape in Cyberspace - Wikipedia | en.wikipedia.org/wiki/A_Rape_in_Cyberspace | |
Free Expression: Consequences and Limits on Networks | Optional reading: original article "A Rape in Cyberspace" by Julian Dibbell in the Village Voice in 1993 | www.juliandibbell.com/texts/bungle_vv.html | Free Expression: Consequences and Limits on Networks | Optional reading: Virtual(ly) Law: The Emergence of Law in LambdaMOO by Jennifer L. Mnookin | jcmc.indiana.edu/vol2/issue1/lambda.html |
4 | Privacy | Optional reading: Blown to Bits, Chapter 2; Code v.2, Chapter 11 | available from websites listed above |
Optional reading: "Can I get some privacy", by Brian Eule, Stanford Magazine, March/April 2013 | Privacy-StanfordMag 3-2013.pdf | ||
PRIVACY: How changes in technology affect privacy issues | REQUIRED reading: "Facebook Announces Home, a Homescreen Replacement Android App Designed around People", by Josh Constine, TechCrunch, April 4, 2013 | Facebook-Home.pdf | |
PRIVACY: How changes in technology affect privacy issues | Optional reading: Facebook Privacy Policy | Facebook Privacy Policy | |
5 | Intellectual Property | Optional reading: Blown to Bits, Chapter 6; Code v.2, Chapter 10 | available from websites listed above |
INTELLECTUAL PROPERTY: How can we own software ideas? | REQUIRED reading: various articles on Apple Inc. v. Samsung Electronics Co., Ltd. | All Things Digital article | |
REQUIRED reading: various articles on Apple Inc. v. Samsung Electronics Co., Ltd. | Seattle blog article | ||
REQUIRED reading: various articles on Apple Inc. v. Samsung Electronics Co., Ltd. | Wikipedia article | ||
REQUIRED reading: various articles on Apple Inc. v. Samsung Electronics Co., Ltd. | Patent for Pinch-to-Zoom | ||
6 | Who owns information? | See Optional readings for week 4 on Privacy | |
REQUIRED reading: the Highlight app | Highlight website | ||
REQUIRED reading: "Location-sharing app Highlight gets biggest update since launch", by Emily Price, July 19, 2012 | Mashable.com website | ||
REQUIRED reading: "Sneaky Apps that Track Cellphones", New York Times, Dec 23, 2012 | pdf download | ||
7 | Computer Security | Optional reading: Blown to Bits, Chapter 5 | available from website listed above |
REQUIRED reading: Anonymous - Wikipedia | en.wikipedia.org/wiki/Anonymous_(group) | ||
REQUIRED reading: "Anonymous hackers launch massive cyber assault on Israel Cyberspace, #OpIsrael", April 7, 2013 | The Hacker News website | ||
REQUIRED reading: "Anonymous and Rehtaeh Parsons: Group Slams Suspects’ Supporters, Makes Demands", April 19, 2013 | The Huffington Post website | ||
REQUIRED reading: YouTube broadcast from Anonymous, April 12, 2013 | YouTube website | ||
REQUIRED reading: "Canada reopens Rehtaeh Parsons rape case following Anonymous involvement", April 13, 2013 | RT.com website | ||
REQUIRED reading: "17-year-old alleged Anonymous Hacker charged for unauthorized access", April 15, 2013 | The Hacker News website | ||
8 | Software Reliability and Professional Ethics | REQUIRED: Therac-25 Case | computingcases.org website |
8 | REQUIRED: Association for Computing Machinery (ACM) Code of Ethics | ACM website | |
8 | REQUIRED: ACM/IEEE Software Engineering Code of Ethics | ACM website | |
9 | Global Issues of the Internet | Optional reading: Code v.2, Chapter 15 | available from website listed above |
REQUIRED reading: "Will the Internet End Up Controlled by Big Business and Politicians?", Dec 24, 2012 | Guardian UK | ||
REQUIRED reading: "A Web world without borders", March 3, 2013 | Foreign Policy magazine | ||
REQUIRED reading: "Prosecution of Anonymous Activists Highlights War for Internet Control", November 12, 2012 | Guardian UK | ||
10 | AI, Robotics and Moral Machines | REQUIRED reading: "The Future of Moral Machines" by Colin Allen, Dec 25, 2011; NY Times Opinion Pages | NY Times website |
REQUIRED reading: "Do Drones Undermine Democracy", by Peter Singer, January 19, 2013 NY Times | NY Times pdf | ||
REQUIRED reading: "World's most human-like android head", April 26,2013, KurzwielAI.net | KurweilAI.net pdf |