CIS 350—Computers and Society
Spring 2002 Syllabus
Page 9 of 10
(Response to other's debate postings; debate concludes)
Week 10 (March 31- April 6) —Issue 5: Privacy and Civil Liberties
What is privacy? Why is privacy important? What issues related to privacy must you understand as a computer professional? You are responsible for the following:
Lecture: "Lecture 8" "Computerized data bases and Privacy"
Johnson Chapter 5
Laudon, K.C. Markets and Privacy. CACM, Sept. 1996, 92- 104.
Lin & Loui, "Taking the Byte out of cookies: Privacy, consent and the web. Computers and Society, June 1998, 39- 51.
Munro, Neil, "The Ever-Expanding Network of Local and Federal Databases," CACM July 2002, 17- 19.
WebBoard Discussion: Do you believe Johnson when she claims that loss of privacy results in loss of autonomy and increased conformity?
Week 11 (April 7- 13) —Issue 6: Computer Crime and Security
How are computer systems abused, or used to hurt others? How do we make information secure on computers? What does the law say? You are responsible for the following:
Lecture: "Lecture 9" " privacy, Security, Computers and the Law"
Johnson Chapter 4
Chin, S.K, High-confidence design for security, CACM, July 1999, 33-37.
WebBoard Discussion: Who should be held responsible for security breaches and information lost due to inadequate security measures?
2. (second) Ethical case analysis, part 1, individual analysis
Week 12 (April 14- 20) —Issue 7: Intellectual Property and Responsible Computing
What is intellectual property and how is it protected? What problems does software pose to our notions of intellectual property? What are your responsibilities as a computer professional? You are responsible for the following:
Lecture: "Lecture 12" "Protection of Intellectual Property in Software"
Johnson Chapters 6 and 7
Davis, R. et. al, A new view of intellectual property and software. CACM March 1996, 21- 30.
(skim) site on the Digital Millennium Copyright Act -