CS 291 - Course Plan
Date Topic Lecture-Reading Recommended Reading Event
Feb 5Introduction
Feb 7What is Computer Ethics?
  • Moor, What is computer ethics? CESV
  • Barlow, Coming into the country CESV
  • Gotterbarn, Computer ethics: responsibility regained CESV
  • Winograd, Computers, ethics, and social responsibility CESV
  • Johnson, CE Chapter 1
Feb 12Risks of computing
  • Borning, Computer system reliability and nuclear war CESV
  • Corbato, On building systems that will fail CESV
  • Littlewood and Strigini, The risks of Software CESV
  • Parnas, et. al., Evaluation of safety-critical systems CESV
  • Smith, The limits of correctness CESV
  • Petroski, From slide rule to computer CESV
  • Friedman and Kahn, Human agency and responsible computing CR
  • Schrader- Freschette, Risk (to be circulated in class)
Feb 14Responsibility
  • Leveson and Turner, An investigation of the Therac-25 accidents CESV
  • Hart, Responsibility and retribution CESV
  • Nissenbaum, Computing and accountability CESV
  • Samuelson, Liability for defective electronic information CESV
  • Johnson, CE Chapter 7
Feb 19Professional Responsibility
  • Weizenbaum, On the impact of the computer on society CESV
  • Johnson, Professional ethics CESV
  • Collins and Miller, Programming and the public trust CESV
  • Fried, Rights and roles, pp117-133 CR
  • Applbaum, Professional detachment CR
Movie to be shown this week
Feb 21Professional Codes
  • Roland and Schinzinger, Professional codes CESV
  • Ladd, The quest for a code of professional ethics CESV
  • Davis, Thinking like an engineer CESV
  • Jamal and Bowie, Theoretical considerations for a meaningful code of professional ethics CR
  • ACM Code of ethics CESV
Feb 26Responsibility continued
Feb 28Guest speaker, Rebecca Mercuri--Computing and risk
  • CPSR, Vulnerable on all counts CR
In addition to regular class hour, students should attend the Computer Science Colloquium at 4p.m. when Rebecca Mercuri will talk on computerized voting.
Mar 11st Paper due
Mar 4Guest speaker, Prof. Ed Felten
Mar 6Deontological and consequentialist frameworks
  • Lyons, Utilitarianism CR
  • Fried, pp 73-95 CR
  • Johnson, CE Chapter 2
Mar 11Justice and rights
  • Rawls, sections 3,11 CR
  • Gewirth, Rights CR
  • Fried, pp 96-102 CR
Mar 13Law and morality
  • Devlin, Morals and criminal law in The enforcement of morals, chapter 1 (NY: Oxford 1972, 1965) To be distributed in class
  • Hart, Law, liability and morality CR
  • Rawls, section 53 in CR
Mar 16-23Spring Recess
Mar 25Unauthorized copying of software
  • Nissenbaum, Should I copy my neighbor's software? CESV
  • Software License, Any shrinkwrap license Arthur Kuflik, Moral foundations of intellectual property rights CESV
  • Johnson, CE Chapter 4
Mar 27Intellectual property rights over software
  • Office of Technology Assessment, Evolution of case law on copyrights and computer software CESV
  • Snapper, Intellectual property protections for computer software CESV
  • Stallman, Why software should be free CESV
  • Kahin, The software patent crisis CESV
  • Stern, Tales from the algorithm war CESV
  • US District Court, D. Massachusetts, Lotus development corporation v. Paperback Software International and Stephenson Software CESV
  • Samuelson, How to interpret the Lotus decision CESV
Apr 1Privacy and government
  • Orwell, 1984
  • Laudon, Information systems in a democracy CESV
  • Shattuck, Computer matching is a serious threat to privacy CESV
  • Kusserow, The government needs matching to root out waste and fraud CESV
  • Hunter, Public Image CESV
Movie and Paper 2 due!
Apr 3Moral and legal foundations
  • Gavison, Privacy and the limits of the law CESV
  • Rachels, Why privacy is important CESV
  • Posner, An economic theory of privacy CESV
Apr 8Privacy, continued
Apr 10The private sector
  • Culnan and Smith, Lotus Marketplace CESV
  • Barlow, Private life in cyberpace CESV
  • Chaum, A new paradigm for individuals in the information age CESV
  • Ramirez, How 'unlisted' is becoming 'kind of listed' CR
  • Andrews, The '96 race on the internet CR
  • Sipior and Ward, Legal quandary CR
  • Weisband and Reinig, Managing user perception of email privacy CR
Apr 15Policy
  • Rule et. al., Preserving individual autonomy in an information-oriented society CESV
  • Berman and Goldman, A federal right of information privacy: the need for reform CESV
Apr 17Computer Crime and Hacker Ethics
  • Eisenberg, The computer worm CESV
  • Spafford, Are computer break-ins ethical? CESV
  • Denning and Drake, A dialog on hacking and security CESV
  • Stallman, Are computer property rights absolute? CESV
  • Johnson, Computer Ethics: Old and New, Chapter 6
  • Lewis, Between and hacker and a hard place CR
  • Gabriel, Reprogramming a convicted hacker CR
  • Markoff, A most wanted cyberthief is caught in his own web CR
  • Markoff, How a computer sleuth traced a digital trail CR
  • Branscomb, Rogue computer programs and computer rogues: tailoring the punishment to fit the crime CESV
  • Rotenberg, Computer virus legislation CESV
Apr 213rd Paper due
Apr 22Access to computing
  • Gore, Global information infrastructure CESV
  • Chapman and Rotenberg, The national information infrastructure: a public interest opportunity CESV
  • Fried, pp 102-116 CR
  • Civille The Internet and the poor CR
  • RAND Universal Access to E-mail, Chpts. 2 & 6
Apr 24Civil liberties in cyperspace
  • Kapor, Civil liberties in Cyberspace CESV
  • Greenawalt, Rationales for freedom of speech CESV
  • Andrews, Senate supports heavy penalties on computer smut CR
  • CPSR Board of Directors, Just say no to censorship CR
  • Lewis, Despite a new plan for cooling it off, cybersex stays hot CR
  • Lewis Libel suit against Prodigy tests on line speech limits CR
  • Huber Electronic smut CR
  • The Economist, Sex on the Internet CR
  • Markoff On line service blocks access to topics called pornographic CR
  • Cowell Neo-Nazis now network on line and underground CR
  • Schneider, Hate groups use tools of the electronic trade CR
Apr 29Networks and social values
  • Denning, The United States vs. Craig Neidorf CESV
  • Jensen, An electronic soapbox: computer bulletin boards and the First Amendment CESV
  • Banisar, Prodigy held liable CR
  • Brooke, Scientologists loose a battle in Cyberspace CR
  • Levy, Battle of the Clipper Chip CESV
  • Samuelson, Intellectual property rights CR
  • Samuelson, The NII intellectual property report CR
  • Barlow, Property and speech CR
May 1Conclusion and Overview
  • Forster, The machine stopped CESV
May 64th Paper due

jdierkes@cs