US Patent 6,085,192 System and Method for Securely ...
Capstone Computer Ethics and Student Outcomes Assignment
(10% of final Capstone I grade)
Purpose
The purpose of this assignment is to contribute to student outcomes as described below. The assignment offers students a wide exposure to many topics related to computer ethics, societal impact, sustainability, historical context, and other topics not often covered in day-to-day computer classes.
CE Program Student Outcomes
• c An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability.
• f An understanding of professional and ethical responsibility.
• g An ability to communicate effectively.
• h The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.
• i A recognition of the need for, and an ability to engage in life-long learning.
• j A knowledge of contemporary issues.
CS Program Student Outcomes
• e An understanding of professional, ethical, legal, security and social issues and responsibilities.
• f An ability to communicate effectively with a range of audiences.
• g An ability to analyze the local and global impact of computing on individuals, organizations, and society.
• h Recognition of the need for and an ability to engage in continuing professional development.
Assignment
• Assignment – Each team is to select a topic (some of which are listed below, but other relevant topics not listed below may be acceptable), write a 2 to 3 page single-spaced paper (this doesn’t include the bibliography, which the paper must also have), and make a 4 minute presentation in class. Use the document template provided on the class website (and do not change font sizes or line spacing).
• Due – Each team is to submit a printed copy of the assignment and email a soft copy to the instructor on the due date (doc or docx format). The emailed file name is to be Ethics-Team#.docx where # is replaced by your team number. All students must complete this assignment and attend the presentations.
• Topic category – select a topic related to one of the program outcomes. See examples below. The idea is to specialize a topic to the computing area – e.g., what whistle blowing means in the computing area.
• Paper – single-spaced, topic title, your name/course/semester, headings, a minimum of 3 references. No plagiarism (i.e. copying words or ideas not your own without proper attribution). See “Ethics and Professionalism - paper template.doc”.
• Note: student papers may be made available to other students and will be posted on the web - aim for good, professional quality.
CS/CE Program Outcomes, Subcategories, & Topic Examples (not comprehensive)
• Impact of engineering solutions in a global, economic, environmental and societal context. Social context of computing. Knowledge of contemporary issues (Outcomes CE-C, CE-H, CE-J, CS-E, CS-G)
o Professional responsibilities
▪ Codes of Ethics from ACM and IEEE
▪ Obligations of a professional
▪ Whistle blowing (e.g. Edward Snowden)
▪ Sarbanes-Oxley legislation
▪ Discrimination, harassment
▪ Dependence on computers
▪ Conflict of Interest – identify and resolve, avoid appearance
▪ Sustainability initiatives – how does computing play a role?
▪ Engineers without Borders
o Privacy
▪ the Hollerith-Holocaust connection
▪ iPhone location tracking scandal
▪ Snowden: traitor or whistleblower
▪ total information awareness and NSA
▪ privacy and the IRS scandal
▪ information aggregators, e.g., Acxiom’s website
▪ entity identity and product recalls
▪ identity management – people, animals, things
▪ Invasion of Privacy, PII, identity theft
▪ Privacy legislation in Europe vs. US
▪ RFID privacy issues, e.g., tracking, chipping (embedded in human)s, in passports
▪ Cookies, spyware
▪ Privacy assurance mechanisms
▪ P3P
▪ Spam filters
▪ Data spills
▪ Anonymity
▪ Discovery (legal procedure)
▪ Plagiarism Detection Software
▪ Confidentiality, Integrity, Data quality
o Risks and liabilities of computer-based systems
▪ Safety
• Therac-25 case
• Computer/Game Addiction Awareness
• Cyber war and Cyber terrorism
• Critical infrastructure technologies
▪ Reliability
• Software disasters, risk management
▪ Environmental concerns
• Recycling computers and parts
o Civil liberties
▪ Free speech, Censorship
• Balkanization of the Internet – where each country, organization, or individual sequesters their own data to better control it.
• Hate speech
• Limiting online speech on campus
• Communications Decency Act
• Free software, Open source
▪ Big Brother – see privacy
• Video surveillance
• Corporations monitoring employee email and web usage
• Need to know => need to share
• Technostress
• Dehumanization
o Intellectual property
▪ Software, music, … piracy
▪ Patent process including provisional patents, infringement
▪ Patenting business methods
▪ Copyright and Freedom of Expression
▪ Fair use
▪ Digital rights management
▪ The David LaMacchia Case
▪ Use of personally owned software on company computers
o Ethical issues in AI, DBMS, Software Engineering, …
▪ Introductory programming
• Freedom of speech
• Exploring Computer Security
▪ Networking
• Networked world
• Web browsers and security issues
• Viruses, worms
• Distance learning
• Netiquette
▪ Software Engineering
• Software maintainability
• Designing safety critical system
• Ethical implications of inaccurate simulations
▪ Operating systems
• Introduction to Hacking and Cracking
• Operating system security through design
▪ Human Computer Interfaces
• Ethics in Ergonomics
• Helping People With Disabilities to Use Their Computers
▪ Database Management
• Data Mining and Statistical Inference
▪ Artificial Intelligence
• Turing test
• Human Augmentation
• Immortal Avatar
o Application areas
▪ Daily life
▪ Medical information systems
▪ Electronic government including Voting
▪ Information warfare
• Need for and ability to engage in life-long learning – computing and beyond (Outcomes CE-I , CS-H)
o What survival skills do you need?
▪ Time management – optimizing your life
▪ Habits of successful people
▪ Telecommuting
▪ Continuing Education
▪ Career Advising
• FAQ on how to get into graduate school – requirements, process
• FAQ on how to get a part or full time job
o Learn about new technical topics, e.g.
▪ Grid v. Cloud – what’s the difference?
▪ Human Augmentation – Kinect, Google Glass, …
▪ Immortal Avatar – how to build one
▪ Virtualization
▪ Capacity planning
▪ Business intelligence
▪ Reputation systems
▪ Small world, six degrees of separation, mathematics
▪ Ubiquitous computing
▪ Total information awareness, full visibility
▪ Semantic Web vs. Web 2.0
▪ Peer to peer
▪ Emergent behavior
▪ Trust in agent systems
▪ Location awareness, Geotagging, Geocoding
▪ RSS feeds
▪ AI in computer games
▪ Quality of service
▪ Intelligent transportation systems
▪ Others TBD
o Skills Survey for CS/CE -or- pick an individual skill you think every CSCE student should have
o Entrepreneur
▪ Starting a business – kinds of businesses – covered in SDC
▪ Business plan, Angels, Venture Capital, ROI
▪ How to win an SBIR
o Interview several peers on their intern experiences
o Survey of CS/CE favorites: outside reading, music, games, … how do our students spend their time – studying, programming, sports, …
o Survey top websites that CS/CE students visit
o Survey one or two CS/CE students who graduated 3-5 years ago – what are they doing now, how did their career progress, were they well prepared, what lessons can they share
o Status of outsourcing and offshoring
o Improving recruiting, retention, and diversity in CS/CE fields
o Job outlook in CS/CE & Salary comparison among fields
o Boomerang kids, helicopter parents
o Globalization, Flat world, Information rich and poor
o Job satisfaction in CS/CE
o How much should you save for retirement – 4% rule, rule of 72
o Interview professors in your department on their research areas
• History and impact of computing (Outcomes CE-H, CS-G)
o History of significant people, hardware, software, events, issues, … in computing. Inventors of various programming languages, the mouse, spreadsheets, fuzzy logic, the Web, …
• Communicate effectively, orally and in writing (Outcomes CE-G, CS-F)
Resources – many more are available at the library or online
• Books on Computer Ethics
o R. Spinello, Cyberethics: Morality and Law in Cyberspace, Jones and Bartlett, 2006
o G. Stamatellos, Computer Ethics: A Global Perspective, Jones and Bartlett Publishers, 2007
o Search on Amazon for “computer ethics”
o K. Himma, Internet Security: Hacking, Counterhacking, and Society, Jones and Bartlett Publishers, 2007
• Websites on Computer Ethics – search online for “computer ethics”
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- us patent 6 085 192 system and method for securely
- marketsoft case
- resume writing academy home
- eo heading 1 topic title simple numbers
- funding sources merger acquisition joint venture
- executive summary leeds school of business
- current ei supported sources of 3rd party funding
- solbright inc mit
- stephen keenan
Related searches
- baking soda method for drug test meth
- best payment method for selling a car
- race method for answering questions
- straight line method for amortization
- best learning method for adults
- star method for answering questions
- traditional method for finding correlation calculator
- lymphatic system and immune system similarities
- effective interest method for leases
- annualization method for estimated taxes
- bayesian method for vancomycin dosing
- safe harbor method for home office deduction