Top-Rated Free Essay
Preview

Computer Ethics - Syllabus

Satisfactory Essays
1255 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Ethics - Syllabus
TwinTech University
[pic]

Course Syllabus
Spring 2011 - 2012

Course Title: Ethical and legal aspect in computing
Instructor: Dr. Nagi Ali Al-shaibany Email: shaibany@yahoo.com
Office Room: Office hours: Whenever available or with appointment
Textbook: Sara Baase. “A gift of fire A: Social, Legal, and Ethical Issues for Computing and the Internet, 3/E - 2008- Prentice Hall

Course Description:

This course deals with the impact of computers on us as individuals and on our society. The widespread use of computing technology has changed the way we work, play and interact with other people. These changes have created a flood of new social and legal issues that demand critical examination.
Here are a few examples of the issues we will be talking about: • There is a great deal of information about all of us recorded in computer databases. What rules should govern how this information is used? (We all get privacy notices in fine print from our banks, credit card companies, etc. -- what do they really mean?) Hacking, identify theft and credit card fraud has increased in recent years. What are responses to these types of fraud and what precautions can we take to prevent this from happening? • New encryption methods make it possible to keep e-mail and phone conversations secret from others. How should our desire for privacy be balanced with the need of law-enforcement agencies to intercept communications of suspected criminals or terrorists? • How serious are the problems created by Web sites that contain pornography, 'hate ' material directed at various groups, bomb-making information, etc? Should there be any restrictions on material that is put on the Web? • Computers are increasingly used to control medical devices, airplanes and other safety-critical systems. How safe are such systems? How safe is 'safe enough '? What can we do to manage the risks involved? • It is easy to use computers to copy music, software, books, etc., in violation of copyright law. What is the extent of this problem? What can or should be done about it? What is free software? Should all software be free?
There are (at least) two sides to almost all of the questions we will consider in this course. We will spend much of our class time discussing the issues and exploring different points of view.

Course Objectives

After successfully completing this course, you will: • understand how computing and information systems give rise to social issues and ethical dilemmas • be familiar with some of the issues you may face as a member of a complex technological society • be able to discuss the benefits offered by computing technology in many different areas and the risks and problems associated these technologies • understand some social, legal, philosophical, political, constitutional and economical issues related to computers and the historical background of these issues • be able to explore the arguments on all sides of a controversial issue, and argue convincingly for the position you select • have an increased awareness of current social and legal developments related to computers

Course Requirements

Most of the issues discussed in this course do not have simple or 'pat ' answers that everyone will agree with. An important part of the course will be discussing the issues and debating various points of view.
Each team of students will write a term paper on some topic related to the course. This paper will focus on a social impact of computing technology or on a computer-related public policy or legal issue. The paper will include background research, a discussion of related issues and critical evaluation by the student. There will be one midterm exam and a final exam. Exams may cover anything from the text and supplemental material. Some of this information will not be repeated in class or in the assignments. Be sure to keep up with the assigned readings. (You may want to check your understanding using the questions at the end of the chapters in the text -- some of these same questions may appear on an exam.)

Topics to be covered:

1. Chapter 1: Introduction to Computer ethics 2. Chapter 2: Privacy 1. Chapter 3: Freedom of speech 2. Chapter 4: Intellectual property 1. Chapter 5: Computer crime 2. Chapter 6: Computer at Work 3. Chapter 7: Evaluating and controlling technology 1. Chapter 8: Errors, Failures, and Risk 2. Chapter 9: Professional ethics and responsibilities

Grading Policy: 1. Assignments (10 X 2) 20% 2. Term Paper (Review, Report, Presentation) 20% 3. Midterm 20% 4. Final Exam 40%

* Note:

The attendance will be taken after 15 minutes of the begging of the class so be on time. For the rules and regulations of allowed absence percentage and other rules regarding the course refer to the rules and regulations of the university.
Weekly Schedule

|Week |Topic |Reading |Assignments |
| |Introduction and (Chapter 1) | |Assignment # 1: (Review Exercises|
| |Syllabus and Introduction | |page 39) |
|1 - 2 |Introduction to the course | | |
| |Rapid Pace of Change |Chapter # 1 |Assignment # 2: (Exercise 1.10 |
| |New Developments and Dramatic Impacts | |and Exercise 1.34) |
| |Issues and Themes | | |
| |Ethics | | |
| |(Chapter 2) – Privacy | |Assignment # 3: (Review Exercises|
| |Privacy and Computer Technology | |page 129-130) |
|3 |“Big Brother is Watching You” | | |
| |Privacy Topics |Chapter # 2 |Assignment # 4: (Exercise 2.16 & |
| |Protecting Privacy | |Exercise 2.30 and 2.42) |
| |Communications | | |
| |(Chapter 3) – Freedom of Speech | |Assignment # 5: (Review Exercises|
| |Changing Communication Paradigms | |page 189) |
|4 |Controlling Offensive Speech | | |
| |Censorship on the Global Net |Chapter # 3 |Term Paper topic Selection |
| |Anonymity | | |
| |Protecting Access and Innovation: Net Neutrality or | | |
| |De-regulation? | | |
| |(Chapter 4) –Intellectual Property | |Assignment # 6: (Review Exercises|
| |Intellectual Property and Changing Technology | |page 243-244) |
| |Copyright Law and Significant Cases | | |
|5 |Copying and Sharing | | |
| |Search Engines and Online Libraries |Chapter # 4 | |
| |Free-Speech Issues | | |
| |Free Software | | |
| |Issues for Software Developers | | |
| | | | |
|6 |Midterm |Chapters 1-4 | |
| |(Chapter 5) –Computer Crime | |Assignment # 7: (Review Exercises|
| |Hacking | |page 300) |
| |Identity Theft and Credit Card Fraud | | |
|6-7 |Scams and Forgery | |Term Paper topic review |
| |Crime Fighting Versus Privacy and Civil Liberties |Chapter # 5 | |
| |Laws That Rule the Web | | |
| |(Chapter 6) –Computer at work | |Assignment # 8: |
| |Fears and Questions | |Review Exercises |
|8-9 |The Impact on Employment |Chapter # 6 | |
| |The Work Environment | | |
| |Employee Crime | | |
| |Employee Monitoring | | |
| |(Chapter 7) – Evaluating and Controlling Technology | |Assignment # 9: |
| |Information, Knowledge, and Judgment | |Review Exercises |
| |Computers and Community | | |
|10 |The ‘Digital Divide’ | |Term Paper final review |
| |Evaluations of the Impact of Computer Technology |Chapter # 7 | |
| |Making Decisions About Technology | | |
| |(Chapter 8) Errors, Failures, and Risks | |Assignment # 10: |
| |Failures and Errors in Computer Systems | |Review Exercises |
|11 |Case Study: The Therac-25 | | |
| |Increasing Reliability and Safety |Chapter # 8 |Term Paper report submission |
| |Dependence, Risk, and Progress | | |
| |(Chapter 9) Professional Ethics and Responsibilities | |Term Paper topic Presentation |
| |What is Professional Ethics? | | |
| |Ethical Guidelines for Computer Professionals | | |
|12 |Cases |Chapter # 9 | |
| |References | | |

Term paper notes:

1. The grade for the term paper is 20 grades 2. You can work as teams to prepare the paper but the Maximum number of the team members is THREE. 3. The paper will be on one of the topics we are disusing during the semester and should reflect what you learned from the class. (Separate paper on the instructions will be given during the semester) 4. Paper proposal should be submitted at week # 4. The proposal should be only ONE page which explains the main idea of the paper. The proposal should be agreed on from the instructor before you can continue doing the paper. 5. More details about the term paper will be given as we move on the class.

Bon Chance!!! Dr. Nagi Ali Al-shaibany

References: | | | Term paper notes: 1. The grade for the term paper is 20 grades 2. You can work as teams to prepare the paper but the Maximum number of the team members is THREE. 3. The paper will be on one of the topics we are disusing during the semester and should reflect what you learned from the class. (Separate paper on the instructions will be given during the semester) 4. Paper proposal should be submitted at week # 4. The proposal should be only ONE page which explains the main idea of the paper. The proposal should be agreed on from the instructor before you can continue doing the paper. 5. More details about the term paper will be given as we move on the class. Bon Chance!!! Dr. Nagi Ali Al-shaibany

You May Also Find These Documents Helpful

  • Satisfactory Essays

    A7A 4 EVER

    • 255 Words
    • 2 Pages

    Format: Rough drafts should be minimum four pages and final drafts should be minimum five pages. They should be formatted according to MLA standards (consult your grammar handbook), typed in Times New Roman 12 with 1 inch margins. Papers should have a title, be stapled and contain the student’s name and due date in the upper left hand corner.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BU224 unit 1

    • 893 Words
    • 4 Pages

    6. Any questions about the assignment, or format questions, should be directed to your course instructor.…

    • 893 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Course Project Part Iii

    • 767 Words
    • 4 Pages

    References: Independent Auditor’s Report on Financial Statements Issued in Conformity with International Financial Reporting Standards [Fact sheet]. (n.d.). Retrieved March 10, 2013, from AICPA website: http://www.ifrs.com/overview/Accounting_Firms/Reporting_Standards.html…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Standing up for people and saying what you believe is right, and getting out of our comfort zone takes lots of courage. In Mildred Taylor’s book, Roll of thunder, Hear my cry Stacey Logan faces discrimination and has to use courage. Stacey showed courage multiple times during the book. He took the blame for cheating, he told Mama about going to the Wallace store, and he took T.J back home.…

    • 147 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    5. Be sure to use the spell check function before submitting your assignment. Have someone else…

    • 579 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dounia

    • 4847 Words
    • 20 Pages

    2. You will be required to have in class, the book you are currently reading.…

    • 4847 Words
    • 20 Pages
    Good Essays
  • Better Essays

    Essay#3 Waters Denise

    • 1009 Words
    • 5 Pages

    5. What made you decide to write about this particular topic? Is this topic that you are discussing in another course? Is this a topic that concerns you in…

    • 1009 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    b. You may check with me if you are unsure whether an example you want to use will work. I encourage any of you who wish to discuss your ideas for the paper with me to make an appointment to do so.…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Exam 1

    • 1514 Words
    • 18 Pages

    2. This is an open book/open notes examination. Students are required to work individually on the…

    • 1514 Words
    • 18 Pages
    Satisfactory Essays
  • Good Essays

    An Angry God Thesis

    • 506 Words
    • 3 Pages

    In “Sinners in the Hands of an Angry God”’ Jonathan Edwards uses appeal to fear to help his audience experience the consequences of sinful behavior. One such image is when Jonathan says “ a wide and bottomless pit, full of the fire of wrath, that you are held over in the hand of that God…..nothing you can do, to induce God to spare you one moment…”. Edwards is trying to make you imagine that you are been held by God over the pit of hell. This appeals to fear by creating anxiety of not knowing when he could let you go then, and when he does you would be descending down to hell with know one to help you.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    AP US history

    • 623 Words
    • 3 Pages

    4. Your answers should be as detailed as the question requires AND you must cite the pages from which…

    • 623 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Smart Goals

    • 1072 Words
    • 5 Pages

    6. Please post any questions you have about this assignment in the weekly Q & A forums or contact your faculty member.…

    • 1072 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    My Paper

    • 372 Words
    • 2 Pages

    5. The paper needs to be a minimum of 5 pages. (By 5 pages, I mean a couple of lines on the sixth page, not 4 1/2.)…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Smart Goal

    • 1297 Words
    • 6 Pages

    6. Please post any questions you have about this assignment in the weekly Q & A forums or contact your faculty member.…

    • 1297 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Privacy is a concept of the past, and technology has been ahead of itself for quite some time. The world today is unable to get enough of the new and improved ideas that roll into stores and fly off the shelves. On top of that, the creations that allow people to shop from home has stores shutting down all over the country. The concept is mind boggling, and this country is in a system overload of information that’s about to explode. It’s clear that most the technology that has been created is vulnerable to electronic surveillance and interception. Since some individuals do not have any regard for human life, one shadows in the background seek the opportunity to steal from another. As the world turns and amplifies the whole system from good to worse, the public must find ways to protect themselves. Digital privacy is fading because different aspects of technologies harm society such as credit…

    • 994 Words
    • 4 Pages
    Good Essays

Related Topics