CS 291 - Syllabus
Click here for a week-by-week
schedule!
Computer technology has significantly reshaped
our lifestyles affecting the way we work, relax, treat our sick, shop,
educate our young, fight wars, catch criminals, and even, commit
crimes. Global networks promise even more dramatic changes to
communications, community, and society. The effects of computing are
not limited to the technological and scientific realms but extend also
into the social and ethical. This course examines the social and
ethical implications of computer technology. Its goal is to identify
and formulate answers to questions that deal with the moral basis of
individual responsibilities and actions, as well as with the moral
underpinings of public policy. It pays special attention to the risks
of computing, individual privacy, moral and professional
responsibility, ownership of intellectual property, and the prospects
of a networked world. It considers not only how these values are
affected by computer technology, but how computer technology may be
shaped by them.
This course studies computers and values by
examining actual situations and events in which their mutual
influences are demonstrated. It interprets these real world cases from
various disciplinary perspectives, such as philosophical, legal,
social, and technical. We rigorously evaluate case studies as well as
theoretical interpretations of them. To prepare for class and
preceptorial sessions students should complete readings in
advance. Participation in classroom and preceptorial discussions are
encouraged. In addition, students are given the opportunity to present
a case before the class; coursework also includes written assignments
and research of internet sources.
Course Texts:
- D. Johnson and H. Nissenbaum (eds), Computers, Ethics, and
Social Values. Englewood Cliffs: Prentice Hall, 1995 [Cited as
CESV in Course Plan]
- Deborah Johnson, Computer Ethics: Old and
New. Englewood-Cliffs: Prentice-Hall, 1994 [Cited as CE
in Course Plan]
- George Orwell, 1984. (any edition)
- Course Reader. A course reader is available from Pequod. [Cited
as CR in Course Plan]
- A few items to be circulated in class.
Requirements and Grading:
- Participation in classroom and preceptorial discussion (10%)
- Timely submission of four 6-8 page papers (15% each)
- In-class presentation (10%)
- Final examination (20%)
- Readings to be completed prior to class sessions
- Internet sources to be announced.
To pass the course students must earn passing grade for all papers, final
examination, presentation, and in-class participation.
Course Plan
I. Risk and Responsibility
In this segment of the course we evaluate
the risks of computer technology. Some of these risks are the results
of imperfections in the technology itself, while others are the
consequence of human misunderstandings and misinterpretations. We will
ask questions such as: how to assess the gravity of risks against the
clear benefits of computer technology? Who bears the risks and who
should be making the decisions about whether they are acceptable? Is
computer technology in any way a unique technology in the nature and
extent of the risks it poses?
Following the discussion of risk, we
examine responsibility. Who is responsible for risks and harms caused
by computing? What are the special responsibilitities, if any, of
computer professionals? Beyond the responsibility to produce systems
that work, do computer professionals have a social responsibility to
see that their technology is used only for the betterment of society?
We will apply legal and philosophical concepts to these discussions.
II. Ethical Theory
Ethical theories and concepts from the
Western philosophical tradition offer ways to analyze and clarify
practical questions about values and information technology. In this
segment of the course we review two basic approaches to ethical
theorizing: deontology and consequentialism. We also study the concept
of rights and justice. These enhance our understanding of the many
issues in information technology ethics that are framed in terms of
"rights": the right to own software, the right to privacy, and the
right to benefit from computing. We also examine the relationship
between law and morality. The theoretical approaches and concepts will
be applied and developed throughout the rest of the course.
III. Intellectual Property and Computer Software
Is it wrong to make unauthorized copies
of software? Should software be free? Is the patenting of software
good for society? These are some of the questions addressed in this
section on the private ownership of computer software. Although much
of the scholarly work in the area of software ownership is concerned
with detailed legal questions, we will focus on its philosophical and
ethical aspects.
IV. Privacy and Information Technology
Poll after poll show that Americans are
concerned about the erosion of their privacy. They think the
government knows too much about them and they are becoming
increasingly aware of the many other institutions that have access to
their records. Information technology is at the heart of many of these
intrusions on privacy. This section of the course examines the use of
computerized record-keeping and its effects on privacy. Drawing on
moral and legal understandings of privacy, it evaluates the claims by
individuals in technologically advanced societies to be free of
surveillance.
V. Crime by Computer
Reports of computer crime elicit a
mixture of reactions. On the one hand, people are worried about how
vulnerable society's computerized infrastructure is to infiltration
and destruction. One the other, they are impressed by the ingenuity of
the so-called "hackers." How should we regard infiltration onto
computer systems? What computer crimes are really bad? Are hackers
mere villains of are they Robin Hoods?
VI. The Networked World
More than any other application of computer technology, digital
networks have captured the public's fascination and imagination. But is all
of the attention warranted? Will computer networks transform society,
revolutionize social institutions, remake communities and the political
landscape, and change the world economy; or will they merely provide new
outlets for consumerism and entertainment? How much should society invest
in the new networks? Should the government ensure universal access to
networks even to those who cannot afford to pay the cost?
The final segment of the course will discuss these questions and
others. It will evaluate debates about civil liberties, like free speech,
on the internet. What rules should govern behavior on the internet? We
will also consider the effects that networks may have on fundamental values
such as privacy and property.
Back to the course homepage.
jdierkes@cs