X hits on this document

Word document

NJIT CIS 350—Computers and Society - page 9 / 10

23 views

0 shares

0 downloads

0 comments

9 / 10

CIS 350—Computers and Society

Spring 2002 Syllabus

Page 9 of 10

(Response to other's debate postings; debate concludes)

Week 10 (March 31- April 6) —Issue 5: Privacy and Civil Liberties

What is privacy?  Why is privacy important?  What issues related to privacy must you understand as a computer professional?  You are responsible for the following:

Lecture: "Lecture 8" "Computerized data bases and Privacy"

Readings:

1.

Johnson Chapter 5

2.

Laudon, K.C.  Markets and Privacy.  CACM, Sept. 1996, 92- 104.

3.

Lin &  Loui, "Taking the Byte out of  cookies: Privacy, consent and the web.  Computers and Society, June 1998, 39- 51.  

4.

Munro, Neil, "The Ever-Expanding Network of Local and Federal Databases,"  CACM July 2002, 17- 19.

Assignments:

1.

WebBoard Discussion: Do you believe Johnson when she claims that loss of privacy results in loss of autonomy and increased conformity?

Week 11 (April 7- 13) —Issue 6: Computer Crime and  Security

How are computer systems abused, or used to hurt others? How do we make information secure on computers? What does the law say?  You are responsible for the following:

Lecture:  "Lecture 9" " privacy, Security, Computers and the Law"

Readings:

1.

Johnson Chapter 4

2.

Chin, S.K, High-confidence design for security, CACM, July 1999, 33-37.

Assignments:

1.

WebBoard Discussion: Who should be held responsible for security breaches and information lost due to inadequate security measures?

2. (second) Ethical case analysis, part 1, individual analysis

Week 12 (April 14- 20) —Issue 7: Intellectual Property and Responsible Computing

What is intellectual property and how is it protected?  What problems does software pose to our notions of intellectual property?  What are your responsibilities as a computer professional?  You are responsible for the following:

Lecture: "Lecture 12" "Protection of Intellectual Property in Software"

Readings:

1.

Johnson Chapters 6 and 7

2.

Davis, R. et. al, A new view of intellectual property and software.  CACM  March 1996, 21- 30.

3.

(skim) site on the Digital Millennium Copyright Act - http://www.loc.gov/copyright/legislation/dmca.pdf

Document info
Document views23
Page views23
Page last viewedFri Dec 02 20:24:00 UTC 2016
Pages10
Paragraphs304
Words3506

Comments