|
|
Description
|
CISC 355 -- Computers, Ethics, and Society
An examination of issues raised by the increasingly widespread use of computers from the point of view of those who make and program them, those who use them, and those who are affected by them indirectly. We will briefly cover the history of computing, some philosophical foundations to guide our analysis, ethics for computer professionals, and a number of topic areas. These include hacking and network security, privacy and civil liberties, intellectual property and commerce, artificial intelligence and robotics, and broader economic, environmental, and social issues.
|
Instructor
|
Christopher Rasmussen E-mail: cer@cis.udel.edu Office: Smith 446 Office hours: Tuesdays 2-3 pm and Thursdays 1-2 pm
|
Web page
|
http://nameless.cis.udel.edu/class_wiki/index.php/CISC355_S2010
|
Schedule
|
Tuesdays and Thursdays from 7 pm to 8:15 pm in Smith 201
|
Grading
|
- 15% Create links to, write 1-paragraph summaries about online articles on class wiki (2.5% each). Due on first Tuesday of each unit (except first unit due to snowstorm schedule change)
- 15% Pop quizzes (2.5% each). There will be one per unit on non-presentation days which have some assigned readings for that day, covering only the readings for that day or the class before
- 15% Team presentation. These happen only on Thursdays.
- 40% Position papers (20% each)
- 15% Class participation. This includes attendance and how much you talk, but also the quality of what you say.
Each of your links/summaries should be created no earlier than one week before it is due, relevant to the current course unit, and new. "New" means neither the same as nor overly similar to any other link on this wiki (instructor- or student-created, including from the 2009 version of the course). This includes stories by different media outlets on the same news item. Thus, there is an incentive to post your link early so you are not scooped! Your summary should contain proper bibliographic information and explain enough of what the article is about so that someone can decide whether they want to read it.
For the team presentation, multi-student teams will be assigned roles for a real or hypothetical case involving computer ethics issues. You will deliver a set of slides/outline from the point of view of your role on the day of class, and be prepared to orally present your perspective and lead the discussion in class that day. More details here.
Each position paper is a 4-page analysis of a topic or topics covered in class before its due date. A proposal for a paper subject is due to the instructor at least two weeks before the final document is turned in. In your paper you should summarize the facts of any relevant reading(s) and analyze ethical-social issues raised (following the ImpactCS approach, referring to items in the ACM/IEEE codes, and/or talking more generally about deontological vs. consequentialist perspectives). Do not simply summarize readings!
There are a few constraints on position papers: (1) position paper topics must not shadow presentation topics, and (2) you may not use a case from computingcases.org or onlineethics.org.
Your links and position papers are due by midnight of the deadline day (with a grace period of a few hours afterward). Just post the links, but e-mail your position papers directly to the instructor. A late homework is a 0 without a valid prior excuse. To give you a little flexibility, you have 6 "late days" to use on these to extend the deadline by one day each without penalty. No more than two late days may be used per assignment. Late days will automatically be subtracted, but as a courtesy please notify the instructor in an e-mail of your intention to use them before the deadline.
Students can discuss problems with one another in general terms, but must work independently on all assignments except the team presentation. This also applies to online and printed resources: you may consult them as references (as long as you cite them), but the words you turn in must be yours alone. Any quoting must be clear and appropriately cited. The University's policies on academic dishonesty are set forth in the student code of conduct here.
For the overall course grade, a preliminary absolute mark will be assigned to each student based on the percentage of the total possible points they earn according to the standard formula: A = 90-100, B = 80-90, C = 70-80, etc., with +'s and -'s given for the upper and lower third of each range, respectively. Based on the distribution of preliminary grades for all students (i.e., "the curve"), the instructor may increase these grades monotonically to calculate final grades. This means that your final grade can't be lower than your preliminary grade, and your final grade won't be higher than that of anyone who had a higher preliminary grade.
I will try to keep you informed about your standing throughout the semester. If you have any questions about grading or expectations at any time, please feel free to ask me.
|
|
|
Links
|
|
Supplemental readings
|
- New
- Danah Boyd, article about her research (NY Times, Jan. 20, 2012)
- "I'm Here", 30-minute film about robot love by Spike Jonze
- "The Twitter Trap", Bill Keller, NY Times, May 18, 2011
- Alone Together, Sherry Turkle, Basic Books, 2011
- "The Agony and The Ecstasy of Steve Jobs, monologue by Mike Daisey
- Miscellaneous
- "Spammers Pay Others to Answer Security Tests", Vikas Bajaj, NY Times, April 26, 2010
- "The Daily We: Is the Internet really a blessing for democracy?", Cass Sunstein, Boston Review, summer, 2001
- "Dissent Made Safer: How anonymity technology could save free speech on the Internet", David Talbot, MIT Technology Review, May/June 2009. Mostly about Tor
- "Data sifted from Facebook wiped after legal threats", Jim Giles, New Scientist, March 31, 2010
- "Technology Coalition Seeks Stronger Privacy Laws", Miguel Helft, NY Times, March 30, 2010
- "China's Cyberposse", Tom Downey, NY Times, March 7, 2010
- "Student Online Speech Suit Can Go On", Carmen Gentile, NY Times, February 15, 2010
- Jan/Feb 2010 Popular Mechanics cover story on "Can We Trust Robots?" (not online?) Accompanying analysis about the idea of the "uncanny valley", Erik Sofge, Popular Mechanics, Jan. 20, 2010
- Joshua Davis articles from Wired on DNS vulnerability, lonelygirl15
- "In Japan, Machines for Work and Play Are Idle", Hiroko Tabuchi, NY Times, July 12, 2009
- "Scientists Worry Machines May Outsmart Man", John Markoff, NY Times, July 25, 2009
- "Damn Spam: The Losing War on Junk E-mail", Michael Specter, The New Yorker, August 6, 2007
- Background
- General "Ethics" entries
- "What is Computer Ethics?", James Moor, from Terrell Ward Bynum, ed., Computers & Ethics, Blackwell, 1985, pp.266-275
- "What's Wrong?", Chap. 1 (pp. 1-55) of Moral Minds, M. Hauser. Good background on Hume, Kant, Rawls with a number of specific scenarios
- Challenge to Socrates, Republic, Plato (stop after paragraph beginning "The cause of all this, Socrates...")
- Three classes of good, ring of Gyges
- Book III, Part I "Of Virtue and Vice in General", A Treatise of Human Nature, David Hume
- Chapter 1, "Dilemma," On Human Nature, E. O. Wilson
- "The Nature of Evil" transcript of interview with Prof. Marc Hauser, John Rieger, Jul. 21, 2006
- Liability
- Hacking
- AI/robotics
- "Runaround", Isaac Asimov, Astounding Science Fiction, 1942 (3 laws)
- "Robot Code of Ethics to Prevent Android Abuse, Protect Humans", National Geographic News, March 16, 2007 (S. Korea)
- "Robotic age poses ethical dilemma", BBC News, March 7, 2007 (S. Korea)
- Mentions/links to similar efforts in Europe, Japan
- "Robot ethics", Science magazine, November 16, 2007
- Framing Frankenstein: Coding Ethics for robots, Corey Tomsons, May 8, 2007. Interesting blog post with links to many of above and thoughts about the whole thing
- "Ethics 101 for robots", IEEE Spectrum blog, February 28, 2008. This links to Arkin's paper, Sharkey's commentary, and Ethics of Autonomous Military Systems conference
- Wired for War, P. W. Singer (book website; links to videos/pics)
- Social issues
- "Why the Future Doesn't Need Us", Bill Joy, Wired, April, 2000
- "The Gender Gap Goes High Tech", Charles Piller, LA Times, August 25, 1998
- "Bridging the Digital Divide, One Laptop at a Time", Knowledge@Wharton, June 11, 2008
- Case studies
|
#
|
Date
|
Topic
|
Notes/video
|
Readings
|
Links
|
1
|
Feb. 9
|
Course introduction; part 1 of history of computing
|
|
|
Slides
|
|
Feb. 11
|
NO CLASS University closed for snowstorm
|
|
|
|
2
|
Feb. 16
|
Part 2 of history of computing
|
"Triumph of the Nerds", part I, Robert Cringely PBS documentary, 1996
|
- "The Computer", Otto Friedrich, Time magazine Person of the Year story, Jan. 4, 1983
|
|
3
|
Feb. 18
|
Ethics basics
|
Moral tests, morality in animals, metaethics
|
|
|
4
|
Feb. 23
Register/add deadline Feb. 22
|
Ethics basics
|
Overview of normative, applied ethics
|
- Sections 2 & 3 of Ethics, Internet Encyclopedia of Philosophy entry
|
Links HW #1 (computing history)
|
5
|
Feb. 25
|
Professional issues
|
Product reliability, whistle-blowing
|
- Hughes case, computingcases.org (chip testing)
- "Lighting up the night, and a legal battle", Jonathan Glater, NY Times, Nov. 1, 2008 (flare testing)
- "One Find, Two Astronomers, and an Ethical Brawl", Dennis Overbye, NY Times, Sep. 13, 2005 (priority conflict, stealing data)
|
Team #1 (McGinnis, Kiser, Singh) presentation
|
6
|
Mar. 2
|
Professional issues
|
Codes of ethics
|
|
|
|
Mar. 4
|
NO CLASS Instructor away
|
|
|
Position paper #1 proposal due
|
7
|
Mar. 9
|
Hacking/network security
|
Hacker ethics, netiquette
|
|
Links HW #2 (professional issues)
|
9
|
Mar. 11
|
Hacking/network security
|
Security research, botnets, captchas
|
- "The Ethics of Vulnerability Research" (+ Ranum's counterpoint), Bruce Schneier, Information Security Magazine, May, 2008
- "Kraken Botnet Infiltration Triggers Ethics Debate", Ryan Naraine, May 1, 2008, eweek.com
- "Antispam weapon recaptures lost text", Suw Charmon-Anderson, guardian.co.uk, November 26, 2008
|
Team #2 (Vinod, Reskakis, Merrick) presentation
|
10
|
Mar. 16
|
Hacking/network security
|
Worm and virus writers, white hats vs. black hats
|
- "Who Let the Worms Out?", Joseph Panettieri, eweek.com, March 12, 2001
- "The Computer Jam, and How It Came About", John Markoff, NY Times, November 9, 1988
- "Computer Intruder is Found Guilty", John Markoff, NY Times, January 23, 1990
- "Kevin Poulsen", entry on cybercrime at ThinkQuest
- "Should You Hire a Convicted Hacker?", Mathew Schwartz, InformationWeek, March 11, 2008
- "MySpace Predator Caught By Code", Kevin Poulsen, Wired, October 16, 2006
|
|
11
|
Mar. 18
|
Hacking
|
"War Games", part 1
|
|
Position paper #1 due
|
12
|
Mar. 23
|
Hacking
|
"War Games", conclusion & discussion
|
|
|
13
|
Mar. 25
|
Privacy/civil liberties
|
Privacy, surveillance, free speech
|
- "Your Vanishing Privacy", Bruce Schneier, Minneapolis Star-Tribune, March 5, 2006
- "Point, click, eavesdrop: How the FBI Wiretap Net operates", Ryan Singel, Wired.com, August 29, 2007
- Machado case, computingcases.org (free speech)
- "Immune to Critics, Secret-Spilling Wikileaks Plans to Save Journalism ... and the World", Ryan Singel, Wired.com, July 3, 2008
|
Team #3 (Gilsenan, Buckley, Senseny) presentation
|
|
Mar. 30
|
NO CLASS Spring break
|
|
|
|
|
Apr. 1
|
NO CLASS Spring break
|
|
|
|
14
|
Apr. 6
|
Privacy/civil liberties
|
Anonymity
|
|
Links HW #3 (hacking/network security)
|
15
|
Apr. 8
|
Privacy/civil liberties
|
Social networking
|
- "A Flashy Facebook Page, at a Cost to Privacy", Kim Hart, Washington Post, June 12, 2008
- "Facebook Withdraws Changes in Data Use", Brad Stone and Brian Stelter, NY Times, February 18, 2009
- "For Some, Online Persona Undermines a Résumé", Alan Finder, NY Times, June 11, 2006
- "Project ‘Gaydar’", Carolyn Johnson, Boston Globe, September 20, 2009
|
|
16
|
Apr. 13
|
Intellectual property/commerce
|
Copyright, free software, piracy
|
|
Links HW #4 (privacy/civil liberties)
|
17
|
Apr. 15
Withdraw deadline Apr. 16
|
Intellectual property/commerce
|
DMCA, net neutrality
|
- "10 Years Later, Misunderstood DMCA is the Law That Saved the Web", David Kravets, Wired (Threat Level), October 27, 2008
- "Amazon Erases Orwell Books From Kindle", Brad Stone, NY Times, July 17, 2009
- "YouTube and the irrepressible dream of Video ID", Web Scout blog, LA Times, August 19, 2008
- "Why You Should Care About Net Neutrality", Tim Wu, Slate.com, May 1, 2006
|
Team #4 (Magee, Allen, Schiavo) presentation
|
18
|
Apr. 20
|
Intellectual property/commerce
|
Business rating sites, spam
|
- "The Review Site Yelp Draws Some Outcries of Its Own", Claire Miller, NY Times, March 2, 2009
- "Yelp Makes Changes in Response to Small-Business Owners", Clair Miller, NY Times, April 6, 2010
- "In Bid to Sway Sales, Cameras Track Shoppers", Stephanie Rosenbloom, NY Times, March 20, 2010
|
|
19
|
Apr. 22
|
AI/robotics
|
Safety issues, caregiving (medical/educational)
|
- "Trust Me, I'm A Robot, Economist, Jun. 8, 2006
- "Ethical Frontiers of Robotics" (stop before military stuff), Noel Sharkey, Science magazine, December 19, 2008
- "In gadget-loving Japan, robots get hugs in therapy sessions", Yuri Kageyama, USA Today, April 11, 2004
|
Team #5 (Yates, Busanus, Alikhan) presentation
|
20
|
Apr. 27
|
AI/robotics
|
Rights of robots
|
|
Links HW #5 (IP/commerce)
|
21
|
Apr. 29
|
AI/robotics
|
Military applications
|
|
|
22
|
May 4
|
Social issues
|
Labor, environmental (energy, pollution) impacts
|
|
Position paper #2 proposal due
Links HW #6 (AI/robotics)
|
23
|
May 6
|
Social issues
|
Depersonalization, online social interactions
|
- "The Trolls Among Us", Mattathias Schwartz, NY Times, August 3, 2008
- 'City of Heroes' character 'Twixt' becomes game's most hated outcast courtesy, of Loyola professor, Ramon Antonio Vargas, New Orleans Times-Picayune, July 6, 2009
- "When the Bullies Turned Faceless", Christopher Maag, NY Times, December 16, 2007
|
Team #6 (Schulte, Qasim) presentation
|
24
|
May 11
|
Social issues
|
Equity of access
PBS Frontline "Digital Nation", part 1
|
|
|
25
|
May 13
|
NO CLASS
|
|
|
|
26
|
May 18
|
Social issues
|
"Digital Nation", part 2 and discussion
|
|
Position paper #2 due
|
|
|
NO FINAL EXAM
|
|
|
|