COSC-3325-01 (Computer Law and Ethics)
Spring Semester, 2012, 12:20pm-1:10pm, room 111, on Mondays, Wednesdays, and Fridays
Instructor: Associate Professor Stefan Andrei, Computer Science,
Room 0-69, 880-8748, Emails: Stefan.Andrei@lamar.edu, sandrei@my.lamar.edu,
Webpage: http://galaxy.cs.lamar.edu/~sandrei/
Consultations are given by
Dr. Andrei Stefan, 10:30am-12:00am on Mondays, Wednesdays,
Fridays and anytime by email appointment.
Course objectives:
There are six main objectives of this course:
- To give an introduction to the ethical style of good writing in computer science;
- To present the social, legal, philosophical, and economic issues related to computers that members of a technological society might face in their professional and civic lives;
- To discuss Copyright Laws/Issues and Model Ethical Acquisition and Use of Digital Information, Citing Sources Using Established Methods
- To describe Proper Etiquette and Knowledge of Acceptable Use Policies When Using Networks, Especially Resources on the Internet and Intranet
- To discuss Measures, Such As Passwords or Virus Detection/Prevention, To Protect Computer Systems and Databases from Unauthorized Use and Tampering
- To describe the Impact of Computer Programming On the World Wide Web (WWW) Community
Student learning outcomes:
- To think critically and ethically about computer science field;
- To discover and investigate relevant lawful information in order to gain knowledge and solve problems;
- To analyze information and ideas using appropriate methods;
- To ethically generate his/her own ideas and express them effectively orally and in writing;
- To deliver an ethical point of view and develop it with awareness of alternatives.
Course materials:
The course is mainly taught from the adopted book, but there are other recommended books, too:
- Sara Baase: A gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, ISBN: 978-0-13-601918-3.
Recommended textbooks:
- Justin Zobel: Writing for Computer Science, Springer 1997, ISBN: 981-3083-22-0
- George Reynolds: Ethics in Information Technology, ISBN: 978-1-4188-3631-3
Grading criteria:
The grade for the course will be based on tutorials, several
homework assignments, one mid-term written exam and one comprehensive
final written exam, with percentages assessed as follows:
- Assignments: 10%
- Mid-Term Exam: 20% (open book)
- Presentation and written report: 30%
- Written final exam: 40% (open book)
Lectures:
- lecture1.pdf
- lecture2.pdf
- lecture3.pdf
- lecture4.pdf
- lecture5.pdf
- lecture6.pdf
- lecture7.pdf
- lecture8.pdf
- lecture9.pdf
Assessments:
- Assessment 1
- Assessment 2
- Assessment 3
- Assessment 4
- Assessment 5
- Assessment 6
- Assessment 7
- Assessment 8
Assignments:
The grader of this class is Mr. Sunil Reddy.
Please send the assignments by the due date to his email for
grading: smreddy34@gmail.com
- Assignment 1, due date (send it to my email address): 02/20/2012
- Assignment 2, due date: 03/06/2012
- Assignment 3, due date: 03/26/2012
- Assignment 4, due date: 04/10/2012
Experiments about the application of the Diffie-Hellman protocol:
- The experiment will take place on 02/08/2012
The list of projects for presentation is below.
- p17-mccaffertyActivism Vs. Slacktivism.pdf
- (selected by Ms. Carla McKnight) p17-savageBetter Medicine Through Machine Learning.pdf
- p19-greengardPolicing the Future.pdf
- p19-wrightThe Social Life of Robots.pdf
- p23-greengardLaw and Disorder.pdf
- p24-bellLife, Death, and the iPad Cultural Symbols and Steve Jobs.pdf
- p24-linWar2.0CyberweaponsAndEthics.pdf
- p24-rosstonIncentive Auctions.pdf
- p27-samuelsonDoSoftwareCopyrightsProtectWhatProgramsDo.pdf
- p27-wrightAnalyzing Apple Products.pdf
- p29-toyamaEmergingMarkets.pdf
- p30-denningThe Idea Idea.pdf
- p30-normanYet Another Technology Cusp Confusion, Vendor Wars, and Opportunities.pdf
- p30-pickerThe Yin and Yang of Copyright and Technology.pdf
- p33-armourThe Difference Engine.pdf
- p34-taylorData Trends on Minorities and People with Disabilities in Computing.pdf
- p35-mcdermottEmotion and Security.pdf
- p38-denningThe Grounding Practice.pdf
- p38-olsenInterfaces for the Ordinary User Can We Hide Too Much.pdf
- p40-staffBufferBloat What's Wrong With the Internet.pdf
- p44-pachecoPostmortem Debugging in Dynamic Environments.pdf
- p52-berrimanHow Will Astronomy Archives Survive the Data Tsunami.pdf
- p57-greenCodingGuidelines.pdf
- p64-mooreVisual Crowd Surveillance Through a Hydrodynamics Lens.pdf
- p66-kimA Comparative Study of Cyberattacks.pdf
- p6-staffCredit Non-Anonymous Reviewers with a Name.pdf
- p74-hongThe State of Phishing Attacks.pdf
- p74-sojerLicense Risks from Ad Hoc Reuse of Code from the Internet.pdf
- p84-huangThe Next Generation of GPS Navigation Systems.pdf
- p90-faezipourProgress and Challenges in Intelligent Vehicle Area Networks.pdf
- p91-laihLong-Term Confidentiality of PKI.pdf
- p96-gribbleTechnical PerspectiveThe Benefits of Capability-Based Protection.pdf
- p16-greengardThe War Against Botnets.pdf
- p14-gothBrave NUI World.pdf
- p144-hoffmannScaling Up.pdf
- p13-savageGainingWisdomFromCrowds.pdf
- p133-backstromAnonymized Social Networks, Hidden Patterns, and Structural Steganography.pdf
- p132-shmatikovAnonymity Is Not Privacy.pdf
- p122-leroySafety First.pdf
- p11-kroekerThe Rise of Molecular Machines.pdf
- p10-meyerKnowledgeableBeginners.pdf