CS 105: Computer Ethics and Society
Michael Maddox
This is a 10-week course and the final exam will be in class on the 11th week.
Section | Day | Time | Location | Class Dates | Final Exam | Instructor |
005 | Thu | 4:30-5:45pm | Robinson Hall B222 | 9/1 - 11/3 | 11/10 | Maddox |
006 | Thu | 5:55-7:10pm | Robinson Hall B222 | 9/1 - 11/3 | 11/10 | Maddox |
Name | Michael Maddox |
Sections | 005, 006 |
Office Hours | TBD |
|
|
Office | TBD |
mmaddox@gmu.edu | |
Phone | TBD |
Office Hours for teaching assistants are available by appointment. Contact a TA associated with your section to schedule a meeting.
Sections | Name | |
005/006 | Joan Kohorst | jkohorst@masonlive.gmu.edu |
We strongly encourage you to contact the instructor and TAs if you are experiencing difficulty with the course. We are here to help you learn.
For all e-mail communications, include the course and section number in your e-mail subject line to avoid being flagged as trash. For example
Subject: CS 105 Section 001 Question about Kantianism
Quinn, Michael J., "Ethics for the Information Age" 6th Ed., Addison-Wesley, 2013. The textbook is required and students are expected to keep up with readings
Blackboard at http://mymasonportal.gmu.edu. Look for CS 105 and your section number which may be combined with other sections under your professor. All additional materials (readings, slides, announcements) will be available through the web site.
Legal, social, and ethical issues surrounding use of computers and the internet. The course will stress ethical decision-making as well as legal and social responsibility in connection with technology-related concerns. Issues such as security, crime, privacy and intellectual property will be examined in the context of computer use. Students may be requested to conduct research on the internet in any of these areas and/or learn to use practical technological tools related to privacy and security.
1.Students will understand many of the key ethical, legal and social issues related to information technology and how to interpret and comply with ethical principles, laws, regulations and institutional policies.
2.Students will understand the essential issues related to information security, how to take precautions and use techniques and tools to defend against computer crimes.
This course has been approved to satisfy the GMU General Education requirement for one credit of IT Ethics.
This is primarily a discussion-based course. You are expected to attend all course meetings and participate in conversations about course material as well as in-class activities relevant to the course. To facilitate this, assigned readings are to be done before class.
There are two major writing assignments to be done outside of class which comprise a substantial portion of the overall grade. Additional work such as outside research or contributing to discussion board topics may be assigned.
This class relies strongly on class participation. Therefore, it is important that you attend class on a regular basis. While you are welcome to attend an alternate lecture session if you miss your own, please note that you may not assume instructors in different sections will present the same materials. Similarly, unless you obtain advance approval from your instructor, you may not receive credit for class participation or other in-class activities when attending a section other than your own.
Grading will be based on two major assignments, three in-class quizzes, overall in-class participation, and the final exam. These are weighted based on the following weights.
Component | Total Weight |
2 Out-of-class assignments | 30% |
3 In-class quizzes | 20% |
1 Final Exam | 30% |
Participation Chances | 20% |
Final grades will be determined according to following approximate ranges without rounding.
Percent | Grade | Percent | Grade | Percent | Grade | Percent | Grade |
>= 98 | A+ | 90-88 | B+ | 80-78 | C+ | 70-60 | D |
98-92 | A | 88-82 | B | 78-72 | C | <60 | F |
92-90 | A- | 82-80 | B- | 72-70 | C- |
|
|
Unless otherwise specified, all papers and other written assignments are to be individual efforts. Certain portions of group assignments may require individual efforts as well. Be careful to follow instructions regarding acceptable group efforts.
Plagiarism is governed by the GMU Honor Code and will not be tolerated. Instances of cheating and/or plagiarism will be referred to the Honor Committee. Refer to the Familiarize yourself with both the honor code at GMU and the further details of the CS Honor Code Policies.
Absences from class for health or emergency reasons are excusable as long as some proof of the situation can be provided. Participation and quizzes may be made up on a case-by-case basis according to criteria dictated by the professor. Making up participation must be discussed with the professor within 10 days of missing the class. After that period, participation and quiz credit can not be made up.
It is at the sole discretion of the professor on whether to accept any late work. In many cases the out-of class assignments are accepted late with a 10% penalty per day late. Pay attention to deadlines.
Disputes regarding graded assignments, quizzes, and exams must be raised within 10 days of the graded material being available to the student. Disputes not raised in that period will not be considered.
If you are a student with a disability and you need academic accommodations, please see your instructor and contact the Office of Disability Services (ODS). All academic accommodations must be arranged through the ODS.
The approximate schedule of topics and due dates is listed here. Check the web schedule for the most up-to-date version. Readings from "Quinn" refer to the required course text and give the section numbers to read. Sections marked "Skim" can be briefly scanned. Sections marked "Interview" refer to end of chapter interviews to read.
Week | Dates | Topic | Reading / Media | Homework Due |
Week 1 | 8/29-9/2 | Introduction: Ethics & Computers |
|
|
| 9/5 | Labor Day: Monday Classes do not meet |
|
|
|
|
|
|
|
Week 2 | 9/6-9/12 | Philosophical Ethics | Quinn 1.1, 1.5, Skim 1.2-4 |
|
|
|
| Quinn 2 All, Ch 2 Interview: David Moor |
|
Week 3 | 9/13-9/19 | Philosophical and Professional Ethics | Quinn 9.1-2, 9.5-6, Skim 9.3-4 |
|
|
|
| Appendix A |
|
|
|
|
| |
|
|
|
| |
|
|
|
|
|
Week 4 | 9/20-9/26 | Professional Ethics/ Plagiarism/ Accountability | Quinn 8 All, Focus on 8.5 |
|
|
|
|
|
|
Week 5 | 9/27-10/3 | Accountability/ Computer Crime | Quinn Ch. 7 All | HW1 Ethical Theories |
|
|
| Optional: Cybersecurity as a Profession | Due: Thu. 9/29 By 11:59 p.m. |
|
|
|
|
|
Week 6 | 10/4-10/11 | Computer Security | Ch 7 Interview: Matt Bishop |
|
|
|
| Facebook hacked (medium) |
|
|
|
| Matt Honan hacked (long) |
|
|
|
| GMU Password Policy (short) |
|
|
|
|
| |
|
|
| Picking password that's easy to remember and hard to crack (awesome) |
|
|
|
| Avoiding Phishing (medium) |
|
| 10/10 | Columbus Day: No class Monday |
|
|
| 10/11 | Mon classes meet Tue, Tue classes do not meet |
|
|
|
|
|
|
|
Week 7 | 10/12-10/18 | Information Privacy and Social Networking | Quinn 5 All |
|
|
|
| In-class video: Facebook CIA Program |
|
|
|
| In-class vidoe: Hot on Your Trail: Privacy |
|
|
|
|
|
|
Week 8 | 10/19-10/2 | Privacy and the Government | Quinn 6 All |
|
|
|
| In-class video: Frontline: Spying on the Homefront, Part 5 |
|
|
|
| Extra video: Edward Snowden talks about why he leaked NSA secrets |
|
Week 9 | 10/26-11/1 | Intellectual Property | Quinn 4.1-4.7 | HW2 Security/Privacy |
|
|
|
| Due: Thu. 10/27 By 11:59 p.m. |
|
|
|
|
|
Week 10 | 11/2-11/8 | Workplace Issues/ Wrap-up and Review | Quinn 10 All, |
|
|
|
| Esp. 10.5.6 (Net neutrality) |
|
Week 11 | 11/9-11/15 | Final Exam, normal class time and location | Comprehensive: |
|
|
|
| All previous material is fair game. |
|