COSC-3325-01 (Computer Law and Ethics) Spring Semester, 2012, 12:20pm-1:10pm, room 111, on Mondays, Wednesdays, and Fridays

Instructor: Associate Professor Stefan Andrei, Computer Science, Room 0-69, 880-8748, Emails: Stefan.Andrei@lamar.edu, sandrei@my.lamar.edu, Webpage: http://galaxy.cs.lamar.edu/~sandrei/
Consultations are given by Dr. Andrei Stefan, 10:30am-12:00am on Mondays, Wednesdays, Fridays and anytime by email appointment.

Course objectives: There are six main objectives of this course:

  1. To give an introduction to the ethical style of good writing in computer science;
  2. To present the social, legal, philosophical, and economic issues related to computers that members of a technological society might face in their professional and civic lives;
  3. To discuss Copyright Laws/Issues and Model Ethical Acquisition and Use of Digital Information, Citing Sources Using Established Methods
  4. To describe Proper Etiquette and Knowledge of Acceptable Use Policies When Using Networks, Especially Resources on the Internet and Intranet
  5. To discuss Measures, Such As Passwords or Virus Detection/Prevention, To Protect Computer Systems and Databases from Unauthorized Use and Tampering
  6. To describe the Impact of Computer Programming On the World Wide Web (WWW) Community

Student learning outcomes:

  1. To think critically and ethically about computer science field;
  2. To discover and investigate relevant lawful information in order to gain knowledge and solve problems;
  3. To analyze information and ideas using appropriate methods;
  4. To ethically generate his/her own ideas and express them effectively orally and in writing;
  5. To deliver an ethical point of view and develop it with awareness of alternatives.

Course materials: The course is mainly taught from the adopted book, but there are other recommended books, too:

  1. Sara Baase: A gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, ISBN: 978-0-13-601918-3.

Recommended textbooks:
  1. Justin Zobel: Writing for Computer Science, Springer 1997, ISBN: 981-3083-22-0
  2. George Reynolds: Ethics in Information Technology, ISBN: 978-1-4188-3631-3

Grading criteria: The grade for the course will be based on tutorials, several homework assignments, one mid-term written exam and one comprehensive final written exam, with percentages assessed as follows:
  1. Assignments: 10%
  2. Mid-Term Exam: 20% (open book)
  3. Presentation and written report: 30%
  4. Written final exam: 40% (open book)

Lectures:
  1. lecture1.pdf
  2. lecture2.pdf
  3. lecture3.pdf
  4. lecture4.pdf
  5. lecture5.pdf
  6. lecture6.pdf
  7. lecture7.pdf
  8. lecture8.pdf
  9. lecture9.pdf

Assessments:
  1. Assessment 1
  2. Assessment 2
  3. Assessment 3
  4. Assessment 4
  5. Assessment 5
  6. Assessment 6
  7. Assessment 7
  8. Assessment 8
Assignments: The grader of this class is Mr. Sunil Reddy. Please send the assignments by the due date to his email for grading: smreddy34@gmail.com
  1. Assignment 1, due date (send it to my email address): 02/20/2012
  2. Assignment 2, due date: 03/06/2012
  3. Assignment 3, due date: 03/26/2012
  4. Assignment 4, due date: 04/10/2012
Experiments about the application of the Diffie-Hellman protocol:
  1. The experiment will take place on 02/08/2012

The list of projects for presentation is below.
  1. p17-mccaffertyActivism Vs. Slacktivism.pdf
  2. (selected by Ms. Carla McKnight) p17-savageBetter Medicine Through Machine Learning.pdf
  3. p19-greengardPolicing the Future.pdf
  4. p19-wrightThe Social Life of Robots.pdf
  5. p23-greengardLaw and Disorder.pdf
  6. p24-bellLife, Death, and the iPad Cultural Symbols and Steve Jobs.pdf
  7. p24-linWar2.0CyberweaponsAndEthics.pdf
  8. p24-rosstonIncentive Auctions.pdf
  9. p27-samuelsonDoSoftwareCopyrightsProtectWhatProgramsDo.pdf
  10. p27-wrightAnalyzing Apple Products.pdf
  11. p29-toyamaEmergingMarkets.pdf
  12. p30-denningThe Idea Idea.pdf
  13. p30-normanYet Another Technology Cusp Confusion, Vendor Wars, and Opportunities.pdf
  14. p30-pickerThe Yin and Yang of Copyright and Technology.pdf
  15. p33-armourThe Difference Engine.pdf
  16. p34-taylorData Trends on Minorities and People with Disabilities in Computing.pdf
  17. p35-mcdermottEmotion and Security.pdf
  18. p38-denningThe Grounding Practice.pdf
  19. p38-olsenInterfaces for the Ordinary User Can We Hide Too Much.pdf
  20. p40-staffBufferBloat What's Wrong With the Internet.pdf
  21. p44-pachecoPostmortem Debugging in Dynamic Environments.pdf
  22. p52-berrimanHow Will Astronomy Archives Survive the Data Tsunami.pdf
  23. p57-greenCodingGuidelines.pdf
  24. p64-mooreVisual Crowd Surveillance Through a Hydrodynamics Lens.pdf
  25. p66-kimA Comparative Study of Cyberattacks.pdf
  26. p6-staffCredit Non-Anonymous Reviewers with a Name.pdf
  27. p74-hongThe State of Phishing Attacks.pdf
  28. p74-sojerLicense Risks from Ad Hoc Reuse of Code from the Internet.pdf
  29. p84-huangThe Next Generation of GPS Navigation Systems.pdf
  30. p90-faezipourProgress and Challenges in Intelligent Vehicle Area Networks.pdf
  31. p91-laihLong-Term Confidentiality of PKI.pdf
  32. p96-gribbleTechnical PerspectiveThe Benefits of Capability-Based Protection.pdf
  33. p16-greengardThe War Against Botnets.pdf
  34. p14-gothBrave NUI World.pdf
  35. p144-hoffmannScaling Up.pdf
  36. p13-savageGainingWisdomFromCrowds.pdf
  37. p133-backstromAnonymized Social Networks, Hidden Patterns, and Structural Steganography.pdf
  38. p132-shmatikovAnonymity Is Not Privacy.pdf
  39. p122-leroySafety First.pdf
  40. p11-kroekerThe Rise of Molecular Machines.pdf
  41. p10-meyerKnowledgeableBeginners.pdf