Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p.
|
|
- Grace Fowler
- 5 years ago
- Views:
Transcription
1 Preface p. xix Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p. 9 Boolean Algebra p. 10 Zuse's Z Series p. 11 Harvard Mark 1 p. 12 Colossus p. 13 The Atanasoff-Berry Computer p. 13 ENIAC (Electronic Numerical Integrator and Computer) p. 13 Small-Scale Experimental Machine p. 14 First Commerical Computers p. 15 Transistor p. 17 Integrated Circuit p. 18 IBM System/360 p. 19 Microprocessor p. 20 Milestones in Networking p. 22 Electricity and Electromagnetism p. 22 Telegraph p. 23 Telephone p. 24 Typewriter and Teletype p. 25 Radio p. 26 Television p. 27 Remote Computing p. 28 ARPANET p. 28 p. 29 Internet p. 29 NSFNET p. 31 Broadband p. 31 Milestones in Information Storage and Retrieval p. 31 Codex p. 31 Gutenberg's Printing Press p. 32 Newspapers p. 32 Hypertext p. 33 Personal Computers p. 34 Single-Computer Hypertext Systems p. 36 Networked Hypertext: World Wide Web p. 36 Search Engines p. 38 Information Technology Issues p. 39
2 Summary p. 40 Review Questions p. 42 Discussion Questions p. 46 In-Class Exercises p. 46 Further Reading p. 47 References p. 48 An Interview with Douglas Engelbart p. 51 Introduction to Ethics p. 53 Introduction p. 53 Defining Terms p. 54 Four Scenarios p. 55 Overview of Ethical Theories p. 59 Subjective Relativism p. 60 The Case for Subjective Relativism p. 60 The Case against Subjective Relativism p. 61 Cultural Relativism p. 62 The Case for Cultural Relativism p. 63 The Case against Cultural Relativism p. 64 Divine Command Theory p. 66 The Case for the Divine Command Theory p. 66 The Case against the Divine Command Theory p. 67 Kantianism p. 69 Good Will and the Categorical Imperative p. 69 Evaluating a Scenario Using Kantianism p. 71 The Case for Kantianism p. 72 The Case against Kantianism p. 73 Act Utilitarianism p. 74 Principle of Utility p. 74 Evaluating a Scenario Using Act Utilitarianism p. 75 The Case for Act Utilitarianism p. 76 The Case against Act Utilitarianism p. 77 Rule Utilitarianism p. 79 Basis of Rule Utilitarianism p. 79 Evaluating a Scenario Using Rule Utilitarianism p. 79 The Case for Rule Utilitarianism p. 80 The Case against Utilitarianism in General p. 81 Social Contract Theory p. 82 The Social Contract p. 82 Rawls's Theory of Justice p. 84 Evaluating a Scenario Using Social Contract Theory p. 87 The Case for Social Contract Theory p. 87
3 The Case against Social Contract Theory p. 89 Comparing Workable Ethical Theories p. 90 Morality of Breaking the Law p. 91 Social Contract Theory Perspective p. 91 Kantian Perspective p. 91 Rule Utilitarian Perspective p. 92 Act Utilitarian Perspective p. 93 Conclusion p. 93 Summary p. 94 Review Questions p. 95 Discussion Questions p. 97 In-Class Exercises p. 98 Further Reading p. 99 References p. 99 An Interview with James Moor p. 103 Networking p. 107 Introduction p and Spam p. 109 How Works p. 109 The Spam Epidemic p. 110 Ethical Evaluations of Spamming p. 112 Fighting Spam p. 115 Mail Abuse Prevention System p. 115 Ethical Evaluations of Blacklisting by MAPS p. 116 Proposed Solutions to the Spam Epidemic p. 117 CAN SPAM Act of 2003 p. 118 Emergence of "Spim" p. 120 The World Wide Web p. 120 Attributes of the Web p. 120 How We Use the Web p. 121 Too Much Control or Too Little? p. 123 Ethical Perspectives on Pornography p. 124 Analyses Concluding Pornography Is Immoral p. 124 Analyses Concluding Adult Pornography Is Moral p. 125 Commentary p. 125 Summary p. 125 Censorship p. 126 Direct Censorship p. 126 Self-Censorship p. 127 Challenges Posed by the Internet p. 127 Ethical Perspectives on Censorship p. 128
4 Freedom of Expression p. 129 History p. 129 Freedom of Expression Not an Absolute Right p. 130 FCC v. Pacifica Foundation et al. p. 131 Children and the Web p. 132 Web Filters p. 132 Child Internet Protection Act p. 133 Ethical Evaluations of CIPA p. 133 Breaking Trust on the Internet p. 135 Identity Theft p. 135 Chat-Room Predators p. 137 Ethical Evaluations of Police "Sting" Operations p. 138 False Information p. 139 Internet Addiction p. 140 Is Internet Addiction Real? p. 140 Contributing Factors p. 142 Ethical Evaluation of Internet Addiction p. 143 Summary p. 144 Review Questions p. 145 Discussion Questions p. 146 In-Class Exercises p. 147 Further Reading p. 148 References p. 148 An Interview with Jennifer Preece p. 153 Intellectual Property p. 155 Introduction p. 155 Intellectual Property Rights p. 157 What Is Intellectual Property? p. 157 Property Rights p. 157 Extending the Argument to Intellectual Property p. 159 Benefits of Intellectual Property Protection p. 161 Limits to Intellectual Property Protection p. 161 Protecting Intellectual Property p. 163 Trade Secrets p. 163 Trademarks and Service Marks p. 164 Patents p. 165 Copyrights p. 165 Fair Use p. 169 Sony v. Universal City Studios p. 170 RIAA v. Diamond Multimedia Systems Inc. p. 171 Digital Technology and Fair Use p. 173
5 New Restrictions on Use p. 174 Digital Millennium Copyright Act p. 174 Digital Rights Management p. 175 Secure Digital Music Initiative p. 175 Encrypting DVDs p. 176 Making CDs Copyproof p. 177 Criticisms of Digital Rights Management p. 177 Peer-to-Peer Networks p. 178 Napster p. 179 FastTrack p. 179 BitTorrent p. 180 RIAA Lawsuits p. 180 MP3 Spoofing p. 181 Universities Caught in the Middle p. 182 MGM v. Grokster p. 183 Legal Music Services on the Internet p. 184 Protections for Software p. 184 Software Copyrights p. 185 Violations of Software Copyrights p. 185 Software Patents p. 186 Safe Software Development p. 187 Open-Source Software p. 188 Consequences of Proprietary Software p. 188 Open-Source Definition p. 189 Beneficial Consequences of Open-Source Software p. 189 Examples of Open-Source Software p. 190 The GNU Project and Linux p. 191 Impact of Open-Source Software p. 192 Critique of the Open-Source Software Movement p. 192 Legitimacy of Intellectual Property Protection for Software p. 193 Rights-Based Analysis p. 193 Utilitarian Analysis p. 194 Conclusion p. 196 Creative Commons p. 196 Summary p. 198 Review Questions p. 202 Discussion Questions p. 203 In-Class Exercises p. 204 Further Reading p. 204 References p. 205 An Interview with Wendy Seltzer p. 209
6 Privacy p. 211 Introduction p. 211 Perspectives on Privacy p. 213 Defining Privacy p. 213 Harms and Benefits of Privacy p. 214 Is There a Natural Right to Privacy? p. 217 Privacy and Trust p. 220 Disclosing Information p. 221 Public Information p. 223 Rewards or Loyalty Programs p. 223 Body Scanners p. 224 Digital Video Recorders p. 224 Automobile "Black Boxes" p. 225 Enhanced 911 Service p. 225 RFIDs p. 226 Implanted Chips p. 227 Cookies p. 227 Spyware p. 228 U.S. Legislation p. 228 Fair Credit Reporting Act p. 228 The Family Education Rights and Privacy Act p. 229 Video Privacy Protection Act p. 229 Financial Services Modernization Act p. 229 Children's Online Privacy Protection Act p. 229 Health Insurance Portability and Accountability Act p. 230 Public Records p. 230 Census Records p. 230 Internal Revenue Service Records p. 231 FBI National Crime Information Center 2000 p. 231 Privacy Act of 1974 p. 232 Covert Government Surveillance p. 234 Wiretaps and Bugs p. 235 Operation Shamrock p. 237 U.S. Legislation Authorizing Wiretapping p. 238 Title III p. 239 Electronic Communications Privacy Act p. 239 Communications Assistance for Law Enforcement Act p. 239 USA PATRIOT Act p. 240 Data Mining p. 244 Marketplace: Households p. 246 IRS Audits p. 246
7 Syndromic Surveillance System p. 246 Total Information Awareness p. 247 Criticisms of the TIA Program p. 247 Who Should Own Information about a Transaction? p. 248 Opt-in Versus Opt-out p. 248 Platform for Privacy Preferences (P3P) p. 249 Identity Theft p. 249 Background p. 249 History and Role of the Social Security Number p. 251 Debate over a National ID Card p. 252 The REAL ID Act p. 253 Encryption p. 254 Symmetric Encryption p. 254 Public-Key Cryptography p. 255 Pretty Good Privacy p. 255 Clipper Chip p. 258 Effects of U.S. Export Restrictions p. 258 Digital Cash p. 259 Summary p. 262 Review Questions p. 264 Discussion Questions p. 266 In-class Exercises p. 268 Further Reading p. 269 References p. 269 An Interview with Ann Cavoukian p. 275 Computer and Network Security p. 279 Introduction p. 279 Viruses, Worms, and Trojan Horses p. 280 Viruses p. 280 Worms p. 283 The Internet Worm p. 286 Trojan Horses p. 290 Defensive Measures p. 291 Phreaks and Hackers p. 292 Hackers p. 292 Phone Phreaking p. 296 The Cuckoo's Egg p. 297 Legion of Doom p. 297 Fry Guy p. 298 U.S. v. Riggs p. 299 Steve Jackson Games p. 300
8 Retrospective p. 301 Penalties for Hacking p. 302 Recent Incidents p. 303 Denial-of-Service Attacks p. 304 Attacks that Consume Scarce Resources p. 304 Defensive Measures p. 307 Distributed Denial-of-Service Attacks p. 307 SATAN p. 308 Online Voting p. 308 Motivation for Online Voting p. 308 Proposals p. 309 Ethical Evaluation p. 310 Summary p. 313 Review Questions p. 314 Discussion Questions p. 315 In-Class Exercises p. 316 Further Reading p. 317 References p. 318 An Interview with Matt Bishop p. 321 Computer Reliability p. 325 Introduction p. 325 Data-Entry or Data-Retrieval Errors p. 326 Disfranchised Voters p. 326 False Arrests p. 327 Analysis: Accuracy of NCIC Records p. 327 Software and Billing Errors p. 328 Errors Leading to System Malfunctions p. 328 Errors Leading to System Failures p. 329 Analysis: E-Retailer Posts Wrong Price, Refuses to Deliver p. 329 Notable Software System Failures p. 330 Patriot Missile p. 331 Ariane 5 p. 332 AT&T; Long-Distance Network p. 333 Robot Missions to Mars p. 333 Denver International Airport p. 335 Therac-25 p. 336 Genesis of the Therac-25 p. 337 Chronology of Accidents and AECL Responses p. 337 Software Errors p. 340 Post Mortem p. 342 Moral Responsibility of the Therac-25 Team p. 343
9 Computer Simulations p. 344 Uses of Simulation p. 344 Validating Simulations p. 345 Software Engineering p. 347 Specification p. 347 Development p. 348 Validation p. 349 Software Quality Is Improving p. 350 Software Warranties p. 350 Shrinkwrap Warranties p. 351 Are Software Warranties Enforceable? p. 352 Uniform Computer Information Transaction Act p. 355 Moral Responsibility of Software Manufacturers p. 357 Summary p. 359 Review Questions p. 361 Discussion Questions p. 363 In-class Exercises p. 364 Further Reading p. 365 References p. 365 Work and Wealth p. 369 Introduction p. 369 Automation and Unemployment p. 370 Automation and Job Destruction p. 371 Automation and Job Creation p. 372 Effects of Increase in Productivity p. 375 Rise of the Robots? p. 376 Workplace Changes p. 379 Organizational Changes p. 379 Telework p. 381 Temporary Work p. 383 Monitoring p. 383 Multinational Teams p. 384 Globalization p. 385 Arguments for Globalization p. 385 Arguments against Globalization p. 387 Dot-Com Bust Increases IT Sector Unemployment p. 387 Foreign Workers in the American IT Industry p. 388 Foreign Competition p. 389 The Digital Divide p. 389 Evidence of the Digital Divide p. 390 Models of Technological Diffusion p. 391
10 Critiques of the Digital Divide p. 392 The "Winner-Take-All Society" p. 394 The Winner-Take-All Phenomenon p. 394 Harmful Effects of Winner-Take-All p. 395 Reducing Winner-Take-All Effects p. 397 Access to Public Colleges p. 397 Effects of Tuition Increases p. 397 Ethical Analysis p. 398 Summary p. 401 Review Questions p. 403 Discussion Questions p. 403 In-class Exercises p. 404 Further Reading p. 406 References p. 406 An Interview with Jerry Berman p. 411 Professional Ethics p. 415 Introduction p. 415 Is Software Engineering a Profession? p. 416 Characteristics of a Profession p. 416 Certified Public Accountants p. 417 Software Engineers p. 418 Software Engineering Code of Ethics p. 419 Preamble p. 420 Principles p. 421 Analysis of the Code p. 428 Preamble p. 428 Virtue Ethics p. 429 Alternative List of Fundamental Principles p. 432 Case Studies p. 433 Software Recommendation p. 434 Child Pornography p. 435 Anti-Worm p. 436 Whistleblowing p. 438 Morton Thiokol/NASA p. 439 Hughes Aircraft p. 441 Morality of Whistleblowing p. 443 Summary p. 446 Review Questions p. 448 Discussion Questions p. 449 In-class Exercises p. 450 Further Reading p. 451
11 References p. 451 An Interview with Paul Axtell p. 455 Plagiarism p. 459 Consequences of Plagiarism p. 459 Types of Plagiarism p. 459 Guidelines for Citing Sources p. 460 How to Avoid Plagiarism p. 460 Misuse of Sources p. 460 Additional Information p. 461 References p. 461 Table of Contents provided by Blackwell's Book Services and R.R. Bowker. Used with permission.
Teaching a Course on Social Implications of Computing in Undergraduate Curriculum
Teaching a Course on Social Implications of Computing in Undergraduate Curriculum Narayan Debnath, Eugene Lundak, Paul Schumacher Computer Science Department Winona State University Winona, MN 55987 e-mail:
More informationVALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER APPLICATIONS QUESTION BANK III SEMESTER MC7304 PROFESSIONAL ETHICS Regulation 2013 Academic Year 2017 18 Prepared
More informationCS 4001 Possible Term Paper Topics
CS 4001 Possible Term Paper Topics Your topic does not have to come from this list. These are suggestions. The brief comments and questions for each topic are just a few ideas to spark your imagination
More informationA Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics
A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.
More informationChapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics
MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific
More informationManagement Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles
More informationCSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.
CSI 2911 Professional Practice In Computer Science Ethical, social, and professional aspects of the modern computing technology Stan Matwin Jan. Apr. 2012 1 Introduction Why this class? Textbook, other
More informationEthical and social aspects of management information systems
Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How
More informationComputer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi
Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi 1 1 Main Points Computer Ethics Set of rules or standards of behavior for dealing with computer technology Academic field of study Examples
More informationPreface. The rise of Web 2.0 applications allowing people to contribute content to the Web. The emergence of a real economy based on virtual worlds
Preface Computers and high-speed communication networks are transforming our world These technologies have brought us many benefits, but they have also raised many social and ethical concerns My view is
More informationb. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn).
CS285L Practice Midterm Exam, F12 NAME: Holly Student Closed book. Show all work on these pages, using backs of pages if needed. Total points = 100, equally divided among numbered problems. 1. Consider
More informationComputer and Information Ethics
Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch
More informationChapter 4 INFORMATION SYSTEMS
Chapter 4 MANAGING THE DIGITAL FIRM, 12 TH EDITION ETHICAL AND SOCIAL ISSUES IN VIDEO CASES Case 1: Big Brother is Copying Everything on the Internet Case 2: Delete: The Virtue of Forgetting in a Digital
More informationManaging Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm
Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending
More informationIntroduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2
Pi Privacy Introduction The World We Live In: Information collection, exchange, combination, and distribution easier than ever More information access less privacy Trade-offs Privacy vs. need for credentials
More informationHi-Rez Studios Twitch Rewards Program Official Rules
Hi-Rez Studios Twitch Rewards Program Official Rules Thank you for your interest in the Hi-Rez Studios Rewards Program for Twitch.tv (the "Program"). Hi-Rez Studios, Inc. ("Hi-Rez") wants a fair and fun
More informationCS 305: Social, Ethical and Legal Implications of Computing
CS 305: Social, Ethical and Legal Implications of Computing Prof. Andrew P. Black black@cs.pdx.edu 1 We will be right back, after these messages Do you know about PCEP? PCEP is the PSU/PDX Cooperative
More informationPrivacy and Security in an On Demand World
Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where
More informationGetting on the same page
Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the
More informationTechnology in Action. Topics. Computers in Your Career? What is Fluency With IT? 7/17/11. A Savvy Computer User and Consumer:
Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer Literate 1 Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Topics Fluency with Information Technology
More informationINTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY UNIT 1 INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) EVOLUTION OF COMMUNICATION Communication has improved and evolved to facilitate
More informationMountain Brook High School
Mountain Brook High School Technology Operations and Concepts 1. Use accurate terminology related to technology. Use appropriate terminology related to technology. 2. Utilize advanced features of word
More informationSurveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK
Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Outline How does one justify the use by police of surveillance technology in a liberal democracy?
More informationBibb County School District Technology Scope and Sequence Kindergarten - 12 th Grade
Bibb County School District Technology Scope and Sequence indergarten - 12 th Grade Students will 1 2 3 5 Technology Operations and Concepts 1 Use accurate terminology related to technology. Use appropriate
More informationMULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Food Inc. operates a website for their firm. They ask visitors to the website to give
More informationRunning head: THE IMPACT OF COMPUTER ENGINEERING 1
Running head: THE IMPACT OF COMPUTER ENGINEERING 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 THE IMPACT OF COMPUTER ENGINEERING 2 Abstract The purpose of this paper
More informationTip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts
Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the
More informationMANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems
MANAGEMENT INFORMATION SYSTEMS Chapter 4 Ethical and Social Issues in Information Systems Mohammad Najjar, PhD, MBA, BSc Operations & Supply Chain Management Learning Objectives 1. Identify ethical, social
More informationIdentify and use a variety of media storage (cd, dvd, flash, cloud, and etc ) and rationalize their use for specific purposes
Portage Township Schools K-12 Scope and Sequence 1 6-8.CD.2 6-8.CD.1 6-8.CD.1 6-8.CD.3 Demonstrate proficiency in the use of computers and applications as well as an understanding of the concepts underlying
More informationTechnology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 1 Using Technology to Change the World Topics Technology on the World Stage Technology and
More informationWhatever Happened to the. Fair Information Practices?
Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of
More informationRequiem for a Dream. On Advancing Human Rights via Internet Architecture. Farzaneh Badii and Milton Mueller
Requiem for a Dream On Advancing Human Rights via Internet Architecture Farzaneh Badii and Milton Mueller Summary Critical assessment of the belief that we can promote or protect HR through protocol standards
More informationSenior Design Projects: Sample Ethical Analyses
Senior Design Projects: Sample Ethical Analyses EE 441/442 Spring 2005 Introduction What follows are three sample ethical analyses to help you in the preparation of your senior design project report. Please
More informationAll information is correct at the time of print and is subject to change without prior notice.
INFO KIT Copyright Message 2011. Copyright Prestariang Systems (No: 630804-K). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic
More informationSAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Technology and Society CODE NO. : SEMESTER: ANY PROGRAM: AUTHOR: General Education Course (any program)
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationInternet service providers. Manufacturers and retailers. Gaming providers. Individual artists (written, musical and visual arts) On-air talent
MEDIA ENTERTAINMENT Waller s media and entertainment practice goes beyond the typical Nashville representation of country music artists and labels to include companies and individuals in a wide range of
More informationGENERAL PRINCIPLES OF INTERNET GOVERNANCE
GENERAL PRINCIPLES OF INTERNET GOVERNANCE PROPOSAL OF THE FRENCH GOVERNMENT INTRODUCTION: THE VALUES OF THE INFORMATION SOCIETY The network has become a part of every nation s wealth and one of its most
More informationTECHNOLOGY GUIDELINES
DOCESE OF LANSNG Catholic Schools TECHNOLOGY GUDELNES Aligned with Michigan Content Standards and Benchmarks Diocesan Curriculum nstitute June, 2006 NDEX 2006 Diocesan Schools Technology Committee Technology
More informationInternet 2020: The Next Billion Users
Internet 2020: The Next Billion Users Lawrence E. Strickling I. INTRODUCTION I am honored to have the opportunity to preface this edition of CommLaw Conspectus and discuss the Internet policy priorities
More informationBloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Antitrust 1. Anti-Counterfeiting for Licensed Products: What You Don't Know Can Hurt Your Business 2. Antitrust Investigations:
More information2) Software piracy is bad for business. 2) Answer: True False
Exam Name TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) Advances in data storage have made routine violation of individual privacy more difficult. 1) 2) Software
More informationInnovation and Technology Law Curriculum
Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government
More informationLecture 7 Ethics, Privacy, and Politics in the Age of Data
Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc
More informationProposal # xxxxxxxxxxxx. Intercept Jammer. Date:
Proposal # xxxxxxxxxxxx Intercept Jammer Date: Presented From: HSS Development 75 S. Broadway White Plains, NY 060 Office: 94-304-4333 www.secintel.com New York Disclaimers: All descriptions of HSS products
More informationChildren s rights in the digital environment: Challenges, tensions and opportunities
Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April
More informationComputers And Society
Computers And Society Instructor: Dmitri A. Gusev Fall 2007 CS 113: Introduction to Computers Lecture 16, December 13, 2007 Ethical Issues in Computing 1. Disparity in access to computers and networks
More informationPreface Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.
Computers and high-speed communication networks are transforming our world These technologies have brought us many benefits, but they have also raised many social and ethical concerns My view is that we
More informationUSTR NEWS UNITED STATES TRADE REPRESENTATIVE. Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET
USTR NEWS UNITED STATES TRADE REPRESENTATIVE www.ustr.gov Washington, D.C. 20508 202-395-3230 FOR IMMEDIATE RELEASE August 27, 2018 Contact: USTR Public & Media Affairs media@ustr.eop.gov UNITED STATES
More informationRequired Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14
TExES Computer Science 8 12 Curriculum Crosswalk Test Content Categories Domain I Technology Applications Core Competency 001: The computer science teacher knows technology terminology and concepts; the
More informationThe Case for ISO27001:2013
The Case for ISO27001:2013 Second edition ALAN CALDER Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher
More informationCYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS
CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS Document Control Version: 1.0 Author: CS Policies and Standards Section - MOTC Classification: Public Date of Issue: November 2016 Contents
More informationEthics, privacy and legal issues concerning GIS. This is lecture 12
Ethics, privacy and legal issues concerning GIS This is lecture 12 New technologies; new laws Any new technology brings with it a set of previously unencountered ethical problems. E.g. printing press;
More informationCSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards
CSTA K- 12 Computer Science s: Mapped to STEM, Common Core, and Partnership for the 21 st Century s STEM Cluster Topics Common Core State s CT.L2-01 CT: Computational Use the basic steps in algorithmic
More informationEthics. Paul Jackson. School of Informatics University of Edinburgh
Ethics Paul Jackson School of Informatics University of Edinburgh Required reading from Lecture 1 of this course was Compulsory: Read the ACM/IEEE Software Engineering Code of Ethics: https: //ethics.acm.org/code-of-ethics/software-engineering-code/
More informationCourse Topics. COS 109: Computers in our World. Today: Administration. House rules. A bit of numeracy. Administrivia.
COS 109: Computers in our World Andrea LaPaugh aslp@cs.princeton.edu www.cs.princeton.edu/~aslp 304 Computer Science Building, 258-4568 (email is always better) TAs: Jacopo Cesareo, 103B CS Building, jcesareo@...,
More informationAakriti Endlaw IT /23/16. Artificial Intelligence Research Paper
1 Aakriti Endlaw IT 104-003 2/23/16 Artificial Intelligence Research Paper "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code-2/
More informationEnabling Trust in e-business: Research in Enterprise Privacy Technologies
Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 20.8.2009 C(2009) 6464 final COMMISSION RECOMMENDATION 20.8.2009 on media literacy in the digital environment for a more competitive audiovisual and content
More informationTrade Secret Protection of Inventions
Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client
More information1 HB By Representatives Boothe, Clouse, Rowe and Martin. 4 RFD: State Government. 5 First Read: 02-MAR-17. Page 0
1 HB354 2 183292-1 3 By Representatives Boothe, Clouse, Rowe and Martin 4 RFD: State Government 5 First Read: 02-MAR-17 Page 0 1 183292-1:n:03/01/2017:MA/mfc LRS2017-868 2 3 4 5 6 7 8 SYNOPSIS: Under existing
More informationSlide 25 Advantages and disadvantages of patenting
Slide 25 Advantages and disadvantages of patenting Patent owners can exclude others from using their inventions. If the invention relates to a product or process feature, this may mean competitors cannot
More informationEncouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY
Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY The Internet is changing the way that individuals launch businesses, established companies function, and
More information2009 New Jersey Core Curriculum Content Standards - Technology
P 2009 New Jersey Core Curriculum Content s - 8.1 Educational : All students will use digital tools to access, manage, evaluate, and synthesize information in order to solve problems individually and collaboratively
More informationWireless systems. how radio works radio spectrum allocation examples. tradeoffs. non-technical issues
Wireless systems how radio works radio spectrum allocation examples cell phones 802.11 (WiFi) Bluetooth GPS RFID: prox, E-ZPass, store tags, passports,...... tradeoffs spectrum, power, range, size, weight,
More informationInformation Communication Technology
# 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical
More informationAlabama Course of Study Digital Literacy and Computer Science Grade 8
A Correlation of Computer Programming Fundamental Concepts Using Java 2017 To the Alabama Course of Study Digital Literacy and Computer Science Grade 8 Recurring Standards for Digital Literacy and Computer
More informationCyberspace: The new international legal frontier
Cyberspace: The new international legal frontier Keynote address to the Council of Europe Convention on Cybercrime 23 November 2011 CHECK AGAINST DELIVERY Acknowledgements Thorbjorn Jagland - Secretary
More informationCutest Kids Photo Contest
Cutest Kids Photo Contest Cutest Kids Photo Contest is an online contest across HITS 99.9, 93.3 KIOA, STAR 102.5, MORE 104.1 and LAZER 103.3 that will occur from Monday, March 12 th until Sunday, March
More informationMULTIMEDIA PRODUCTION CHECKLIST
MULTIMEDIA PRODUCTION CHECKLIST 1. Development Environment used? Purchase Source Code Use Tools with runtime licence Develop own source code 2. Operating environments targeted? PC under Windows Apple Macintosh
More informationPrivacy by Design: Integrating Technology into Global Privacy Practices
Privacy by Design: Integrating Technology into Global Privacy Practices Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Harvard Privacy Symposium August 23, 2007 Role of the IPC
More informationCheck Your Understanding
Check Your Understanding 1. How can becoming proficient with technology help you understand and participate in important issues in the world at large? 2. How can knowledge of technology help you influence
More informationIndividual Test Item Specifications
Individual Test Item Specifications 8208110 Game and Simulation Foundations 2015 The contents of this document were developed under a grant from the United States Department of Education. However, the
More informationAgile Acquisition of Agile C2
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Dr. Paul Nielsen June 20, 2012 Introduction Commanders are increasingly more engaged in day-to-day activities There is a rapid
More informationThe Ethics of Information Technology and Business
The Ethics of Information Technology and Business Foundations of Business Ethics Series editors: W. Michael Hoffman and Robert E. Frederick Written by an assembly of the most distinguished figures in business
More informationDanielle Vanderzanden
Danielle Vanderzanden Shareholder Boston 617-994-5724 dani.vanderzanden@ogletreedeakins.com Ms. Vanderzanden is a Shareholder in the Boston Office and Co-Chair of the Firm s Data Privacy Practice Group.
More informationCSE468 Information Conflict
CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview Reference Sources and Bibliography NOTE: There are a limited number of publications available
More informationIntroduction State University of New York Press, Albany STEVE WESTBROOK
Introduction STEVE WESTBROOK Five years ago and fresh out of graduate school, I accepted my first tenure-track job at a small university. I had been trained in composition pedagogy. I had completed a dissertation
More informationExecutive Summary Industry s Responsibility in Promoting Responsible Development and Use:
Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the
More informationMULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID
garfinkel.book Page 275 Thursday, June 2, 2005 11:56 PM Chapter 17 MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID Ari Schwartz 1 Paula Bruening 2 Introduction T he private sector s rollout of RFID at
More informationneworleanscitypark.com/2018-photo-contest
New Orleans City Park 2018 Photo Contest The Soul of City Park More than 160 years in the making, New Orleans City Park invites photographers to enter its 2018 Photo Contest! We are looking for striking
More informationData mining and Domestic Security: Connecting the Dots to Make Sense of Data
Center for Advanced Studies in Science and Technology Policy www.advancedstudies.org Information Environment National Security K. A. Taipale Final Pre-publication Draft December 2003 v.3.0b
More informationGAME PRODUCTION HANDBOOK Second Edition
THE GAME PRODUCTION HANDBOOK Second Edition BY HEATHER MAXWELL CHANDLER INFINITY SCIENCE PlliSS INFINITY SCIENCE PRESS LLC Hingham, Massachusetts New Delhi, India TABLE OF CONTENTS Foreword Preface Acknowledgments
More informationIndustrial and Manufacturing Systems
Sets Focus Area: with Performance (KS/PI) Industrial and Manufacturing Systems ENPG02.01 Demonstrate effective oral, written, and visual communication related to industrial and manufacturing systems. ENPG02.01.01.00
More informationUnit 1: The Economic Fundamentals Weeks How does scarcity impact the decisions individuals and societies must make?
Economics Teacher: Vida Unit 1: The Economic Fundamentals Weeks 1-4 Essential Questions 1. How does scarcity impact the decisions individuals and societies must make? 2. What roles do individuals and businesses
More informationDiscussion Points Information Communication Technology: a Legal Practitioners. Perspective. Presented at Law Society of Zimbabwe Winter School 2016
Discussion Points Information Communication Technology: a Legal Practitioners Perspective Presented at Law Society of Zimbabwe Winter School 2016 Introduction Zimbabwe has the few laws and ICT related
More informationComputer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062
Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics
More informationCODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02
STATUS : December 1, 2015 DES C R I P T I O N Type : Internal Document Date : 01/12/2015 Revision : 02 CODE OF CONDUCT. Page 2/7 MESSAGE FROM THE CHAIRMAN AND THE CEO Dear all, The world is continually
More informationDIMACS/PORTIA Workshop on Privacy Preserving
DIMACS/PORTIA Workshop on Privacy Preserving Data Mining Data Mining & Information Privacy: New Problems and the Search for Solutions March 15 th, 2004 Tal Zarsky The Information Society Project, Yale
More informationHacking for Beginners: The Complete Guide
Hacking for Beginners: The Complete Guide Tim Barnes Copyright 2017 by Tim Barnes - All rights reserved. The following ebook is reproduced below with the goal of providing information that is as accurate
More informationTECHNOLOGY CURRICULUM OBJECTIVES
TECHNOLOGY CURRICULUM OBJECTIVES DIOCESE OF ARLINGTON PHILOSOPHY Advancements in our rapidly changing world necessitate the acquisition of technological skills to enable students to function in the 21st
More informationPrivacy engineering, privacy by design, and privacy governance
CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://
More informationFirst Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following
Privacy Notice Introduction This document refers to personal data, which is defined as information concerning any living person (a natural person who hereafter will be called the Data Subject) that is
More information2014 New Jersey Core Curriculum Content Standards - Technology
2014 New Jersey Core Curriculum Content Standards - Technology Content Area Standard Strand Grade Level bands Technology 8.2 Technology Education, Engineering, Design, and Computational Thinking - Programming:
More informationSection 1: Concept paper and questionnaire
Section 1: Concept paper and questionnaire Thomas Weigend (A) Scope of questionnaire (see Annex 1 and Annex 2) The questions in this Section generally deal with cyber crime. This term is understood to
More informationIntroduction to Computer Science - PLTW #9340
Introduction to Computer Science - PLTW #9340 Description Designed to be the first computer science course for students who have never programmed before, Introduction to Computer Science (ICS) is an optional
More informationCyberCivics: A Novel Approach to Reaching K-12 Students with the Social Relevance of Computing. Jim Owens and Jeanna Matthews Clarkson University
CyberCivics: A Novel Approach to Reaching K-12 Students with the Social Relevance of Computing Jim Owens and Jeanna Matthews Clarkson University Overview Definition of CyberCivics Motivation and introduction
More informationAC : THE ROLE OF INFORMATION WARFARE IN INFORMATION ASSURANCE EDUCATION: A LEGAL AND ETHICAL PERSPECTIVE
AC 2007-2158: THE ROLE OF INFORMATION WARFARE IN INFORMATION ASSURANCE EDUCATION: A LEGAL AND ETHICAL PERSPECTIVE Andrew Hoernecke, Iowa State University Thad Gillispie, Iowa State University Benjamin
More informationHong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability
Legal Week s Corporate Counsel Forum 2016 Renaissance Harbour View Hotel 23 June 2016 Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Stephen Kai-yi Wong Privacy
More informationCourse Outline Department of Computing Science Faculty of Science
Course Outline Department of Computing Science Faculty of Science COMP 2920 3 Software Architecture & Design (3,1,0) Fall, 2015 Instructor: Phone/Voice Mail: Office: E-Mail: Office Hours: Calendar /Course
More information