CMSC 304: Ethical and Social Issues in Information Technology

Fall 2013 Schedule

Back to CMSC 304 course page

Class Date Topic Reading Homework Handouts/Comments
1 Wed 8/28 Course Introduction -- -- Slides
2 Wed 9/4 Topic selection -- -- Class topics exercise and reading assignment
Writing guidelines
Participation mini-assignment
3 Mon 9/9 Ethical frameworks "It's Time to Raise My Hand"
Tavani Ch. 2 (Posted on Blackboard)
-- Slides
4 Wed 9/11 Legal and professional frameworks -- -- Reading journal guidelines
Slides
5 Mon 9/16 Analysis framework -- Due: Reading assignment (Piazza)
Due: Participation mini-assignment (Piazza + hardcopy)
Analysis guidelines
In-class case
Slides
6 Wed 9/18 Software development and reuse/open-source software
  • Open Source Definition
  • BSD License
  • Apple's Insane Developer Agreement
  • Ethical Commentary on Software
  • Expert:Open Source Licenses (comparison)
  • Expert:Reusing Open-Source Software and Practices (posted on blackboard)
  • RJ1 Ethical analysis assignment
    7 Mon 9/23 Computer Hacking/Internet Worms -- -- Mr. Roache out of town -- guest instructor John Park
    8 Wed 9/25 History of computing Machine of the Year (Time 1982)
    Past and Future History of the Internet (CACM 1997)
    RJ2 Mr. Roache out of town -- guest instructor Dr. Marie desJardins
    Slides
    9 Mon 9/30 Software piracy/copyright
  • Apple v. Franklin summary
  • Copyright Act of 1976 summary (skim)
  • Digital Millennium Copyright Act summary
  • The Real Loser in Software Piracy
  • ...Who Really Owns DOTA?
  • Expert: Digital Millennium Copyright Act
  • Expert:Apple v. Franklin... Judicial Competence
  • RJ3 --
    10 Wed 10/02 Writing workshop -- Due: Ethical analysis 1 (three hardcopies) Writing workshop guidelines
    11 Mon 10/07 Cyberstalking -- RJ4: freebie; no post required
    Due: Ethical analysis 1 (Final)
    Cyberstalking
    How to Cyberstalk Yourself
    Midterm review guide
    12 Wed 10/09 Hacktivism Hacktivism
    Anonymous
    The Future of 'Hacktivism'
    What Is a 'Hacktivist'?
    Expert: Hacktivism, From Here to There
    RJ5 --
    13 Mon 10/14 Women in computing -- RJ6: freebie; no post required
    Due: Two quality posts
    Women in computing
    Why Aren't Women Interested in Computer Science?
    Let's Be Real About The Lack Of Women In Tech
    Thesis statements handout
    Ethical Analysis #2
    14 Wed 10/16 Midterm -- -- --
    15 Mon 10/21 Digital currency / Bitcoin Digital currency
    Bitcoin (optional)
    Should Money Go Digital?
    Bitcoin And The Black Market: The Ties That Bind
    RJ7 bitcoin (reference)
    useBitcoins.info (reference)
    16 Wed 10/23 Writing workshop
    (How to write a 'good' ethical analysis paper)
    -- Due: 1st draft of Ethical analysis 2 (two hardcopies) --
    17 Mon 10/28 Violence in Video Games -- RJ8: freebie; no post required Violence in Computer Games
    Researcher Says Linking Video Games to Gun Violence Is a 'Classic Illusory Correlation'
    Is there a history of violent video games and gun violence?
    Video game controversies (reference)
    The Agony and the Exidy: A History of Video Game Violence and the Legacy of Death Race (reference)
    18 Wed 10/30 Large-scale security/cyberterrorism -- no RJ required guest instructor Dr. Richard Forno
    19 Mon 11/04 3D printing -- no RJ required
    Due: Ethical analysis 2 (Final; Post to Piazza)
    Final paper
    3D printing (skim)
    Copy Protection for 3-D Printing Aims to Prevent a Piracy Plague
    What's the Deal with Copyright and 3D Printing? (only conclusion)
    20 Wed 11/06 Green computing and e-waste Green computing (skim)
    Electronic waste (skim)
    The Realities of Green Computing
    China: The electronic wastebasket of the world
    5 Signs the Computer Industry Is Going Green
    RJ9 Ethical Guidelines
    21 Mon 11/11 Privacy, wiretapping, surveillance, NSA, and Edward Snowden How the U.S. Uses Technology to Mine More Data More Quickly
    The NSA is giving your phone records to the DEA. And the DEA is covering it up.
    FAQ: What you need to know about NSA surveillance and Edward Snowden
    Some secrets best remain
    RJ10
    Due: Final paper topic paragraph (Post to Piazza as private note content)
    Presentation scoring form
    (last day to drop with 'W' is Tue Nov 12)
    2013 global surveillance disclosures: Summary of revealed surveillance details (Reference; only 1st 2 paragraphs)
    22 Wed 11/13 Cornucopia:
      Jailbreaking/Rooting
      AI/Robots
      Electronic Voting
    -- RJ11 (All 'noted' reading required, but journal on one topic) iOS jailbreaking (1st section)
    Android rooting (1st section)
    Artificial intelligence (1st section & 'Predictions and ethics')
    Robotics (1st section)
    Electronic voting (1st section)
    23 Mon 11/18 I, Robot -- -- Presentation schedule
    Slides on giving presentations
    24 Wed 11/20 I, Robot (part 2) Optional: I, Robot (1st three chapters) by Isaac Asimov (on blackboard) RJ12: Post about I, Robot by Mon 11/25 --
    25 Mon 11/25 Student presentations -- -- --
    26 Wed 11/27 Final Paper independent work -- -- Presentation feedback form (3 page PDF)
    Presentation feedback form (Excel file)
    Thanksgiving Break
    27 Mon 12/02 Student presentations -- -- --
    28 Wed 12/04 Student presentations -- -- --
    29 Mon 12/09 Student presentations -- Due: Two quality posts Group peer evaluations (PDF file)
    Group peer evaluations (word/docx file)
    30 Wed 12/11 Student presentations -- -- --
    -- Wed 12/18
    6:00 - 8:00 pm
    Student presentations
    (Final exam slot)
    -- Due: Final draft of final paper (post to Piazza)
    Due: Group peer evaluations (post to Piazza)
    --

    Last revised: Dec 8, 2013