US Patent 6,085,192 System and Method for Securely ...



Capstone Computer Ethics and Student Outcomes Assignment

(10% of final Capstone I grade)

Purpose

The purpose of this assignment is to contribute to student outcomes as described below. The assignment offers students a wide exposure to many topics related to computer ethics, societal impact, sustainability, historical context, and other topics not often covered in day-to-day computer classes.

CE Program Student Outcomes

• c An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability.

• f An understanding of professional and ethical responsibility.

• g An ability to communicate effectively.

• h The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.

• i A recognition of the need for, and an ability to engage in life-long learning.

• j A knowledge of contemporary issues.

CS Program Student Outcomes

• e An understanding of professional, ethical, legal, security and social issues and responsibilities.

• f An ability to communicate effectively with a range of audiences.

• g An ability to analyze the local and global impact of computing on individuals, organizations, and society.

• h Recognition of the need for and an ability to engage in continuing professional development.

Assignment

• Assignment – Each team is to select a topic (some of which are listed below, but other relevant topics not listed below may be acceptable), write a 2 to 3 page single-spaced paper (this doesn’t include the bibliography, which the paper must also have), and make a 4 minute presentation in class. Use the document template provided on the class website (and do not change font sizes or line spacing).

• Due – Each team is to submit a printed copy of the assignment and email a soft copy to the instructor on the due date (doc or docx format). The emailed file name is to be Ethics-Team#.docx where # is replaced by your team number. All students must complete this assignment and attend the presentations.

• Topic category – select a topic related to one of the program outcomes. See examples below. The idea is to specialize a topic to the computing area – e.g., what whistle blowing means in the computing area.

• Paper – single-spaced, topic title, your name/course/semester, headings, a minimum of 3 references. No plagiarism (i.e. copying words or ideas not your own without proper attribution). See “Ethics and Professionalism - paper template.doc”.

• Note: student papers may be made available to other students and will be posted on the web - aim for good, professional quality.

CS/CE Program Outcomes, Subcategories, & Topic Examples (not comprehensive)

• Impact of engineering solutions in a global, economic, environmental and societal context. Social context of computing. Knowledge of contemporary issues (Outcomes CE-C, CE-H, CE-J, CS-E, CS-G)

o Professional responsibilities

▪ Codes of Ethics from ACM and IEEE

▪ Obligations of a professional

▪ Whistle blowing (e.g. Edward Snowden)

▪ Sarbanes-Oxley legislation

▪ Discrimination, harassment

▪ Dependence on computers

▪ Conflict of Interest – identify and resolve, avoid appearance

▪ Sustainability initiatives – how does computing play a role?

▪ Engineers without Borders

o Privacy

▪ the Hollerith-Holocaust connection

▪ iPhone location tracking scandal

▪ Snowden: traitor or whistleblower

▪ total information awareness and NSA

▪ privacy and the IRS scandal

▪ information aggregators, e.g., Acxiom’s website

▪ entity identity and product recalls

▪ identity management – people, animals, things

▪ Invasion of Privacy, PII, identity theft

▪ Privacy legislation in Europe vs. US

▪ RFID privacy issues, e.g., tracking, chipping (embedded in human)s, in passports

▪ Cookies, spyware

▪ Privacy assurance mechanisms

▪ P3P

▪ Spam filters

▪ Data spills

▪ Anonymity

▪ Discovery (legal procedure)

▪ Plagiarism Detection Software

▪ Confidentiality, Integrity, Data quality

o Risks and liabilities of computer-based systems

▪ Safety

• Therac-25 case

• Computer/Game Addiction Awareness

• Cyber war and Cyber terrorism

• Critical infrastructure technologies

▪ Reliability

• Software disasters, risk management

▪ Environmental concerns

• Recycling computers and parts

o Civil liberties

▪ Free speech, Censorship

• Balkanization of the Internet – where each country, organization, or individual sequesters their own data to better control it.

• Hate speech

• Limiting online speech on campus

• Communications Decency Act

• Free software, Open source

▪ Big Brother – see privacy

• Video surveillance

• Corporations monitoring employee email and web usage

• Need to know => need to share

• Technostress

• Dehumanization

o Intellectual property

▪ Software, music, … piracy

▪ Patent process including provisional patents, infringement

▪ Patenting business methods

▪ Copyright and Freedom of Expression

▪ Fair use

▪ Digital rights management

▪ The David LaMacchia Case

▪ Use of personally owned software on company computers

o Ethical issues in AI, DBMS, Software Engineering, …

▪ Introductory programming

• Freedom of speech

• Exploring Computer Security

▪ Networking

• Networked world

• Web browsers and security issues

• Viruses, worms

• Distance learning

• Netiquette

▪ Software Engineering

• Software maintainability

• Designing safety critical system

• Ethical implications of inaccurate simulations

▪ Operating systems

• Introduction to Hacking and Cracking

• Operating system security through design

▪ Human Computer Interfaces

• Ethics in Ergonomics

• Helping People With Disabilities to Use Their Computers

▪ Database Management

• Data Mining and Statistical Inference

▪ Artificial Intelligence

• Turing test

• Human Augmentation

• Immortal Avatar

o Application areas

▪ Daily life

▪ Medical information systems

▪ Electronic government including Voting

▪ Information warfare

• Need for and ability to engage in life-long learning – computing and beyond (Outcomes CE-I , CS-H)

o What survival skills do you need?

▪ Time management – optimizing your life

▪ Habits of successful people

▪ Telecommuting

▪ Continuing Education

▪ Career Advising

• FAQ on how to get into graduate school – requirements, process

• FAQ on how to get a part or full time job

o Learn about new technical topics, e.g.

▪ Grid v. Cloud – what’s the difference?

▪ Human Augmentation – Kinect, Google Glass, …

▪ Immortal Avatar – how to build one

▪ Virtualization

▪ Capacity planning

▪ Business intelligence

▪ Reputation systems

▪ Small world, six degrees of separation, mathematics

▪ Ubiquitous computing

▪ Total information awareness, full visibility

▪ Semantic Web vs. Web 2.0

▪ Peer to peer

▪ Emergent behavior

▪ Trust in agent systems

▪ Location awareness, Geotagging, Geocoding

▪ RSS feeds

▪ AI in computer games

▪ Quality of service

▪ Intelligent transportation systems

▪ Others TBD

o Skills Survey for CS/CE -or- pick an individual skill you think every CSCE student should have

o Entrepreneur

▪ Starting a business – kinds of businesses – covered in SDC

▪ Business plan, Angels, Venture Capital, ROI

▪ How to win an SBIR

o Interview several peers on their intern experiences

o Survey of CS/CE favorites: outside reading, music, games, … how do our students spend their time – studying, programming, sports, …

o Survey top websites that CS/CE students visit

o Survey one or two CS/CE students who graduated 3-5 years ago – what are they doing now, how did their career progress, were they well prepared, what lessons can they share

o Status of outsourcing and offshoring

o Improving recruiting, retention, and diversity in CS/CE fields

o Job outlook in CS/CE & Salary comparison among fields

o Boomerang kids, helicopter parents

o Globalization, Flat world, Information rich and poor

o Job satisfaction in CS/CE

o How much should you save for retirement – 4% rule, rule of 72

o Interview professors in your department on their research areas

• History and impact of computing (Outcomes CE-H, CS-G)

o History of significant people, hardware, software, events, issues, … in computing. Inventors of various programming languages, the mouse, spreadsheets, fuzzy logic, the Web, …

• Communicate effectively, orally and in writing (Outcomes CE-G, CS-F)

Resources – many more are available at the library or online

• Books on Computer Ethics

o R. Spinello, Cyberethics: Morality and Law in Cyberspace, Jones and Bartlett, 2006

o G. Stamatellos, Computer Ethics: A Global Perspective, Jones and Bartlett Publishers, 2007

o Search on Amazon for “computer ethics”

o K. Himma, Internet Security: Hacking, Counterhacking, and Society, Jones and Bartlett Publishers, 2007

• Websites on Computer Ethics – search online for “computer ethics”

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

o

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download