Course ID: | CSCI 3030. 3 hours. |
Course Title: | Computing, Ethics, and Society |
Course Description: | Introduction to social and ethical issues relating to computer science and information technology. Topics include privacy, intellectual property, open-source software, the digital divide, globalization, professional ethics, social justice issues, and current events. Students should have a working knowledge of personal computing. |
Oasis Title: | Computing Ethics and Society |
Duplicate Credit: | Not open to students with credit in CSCI 3030H, CSCI 3030E |
Prerequisite: | ENGL 1050H or ENGL 1102 or ENGL 1102E |
Semester Course Offered: | Offered spring semester every year. |
Grading System: | A-F (Traditional) |
|
Course Objectives: | In the following learning outcomes, the phrase "in computing" is to be interpreted as scenarios that intersect with the legality, societal impact, creation, deployment, interaction, or withdrawal of software and computing/information technology in contemporary society. At the end of the semester, all students will be able to do the following:
1. Evaluate moral dilemmas in computing using a well-defined theory of ethical decision making.
2. Explain and discuss issues in computing related to intellectual property.
3. Explain and discuss issues in computing related to privacy, security, and the government.
4. Explain and discuss issues in computing related to reliability.
5. Explain and discuss issues in computing related to education, employment, and globalization.
6. Explain and discuss issues in computing related to professional development. |
Topical Outline: | In the following learning outcomes, the phrase "in computing" is to be interpreted as scenarios that intersect with the legality, societal impact, creation, deployment, interaction, or withdrawal of software and computing/information technology in contemporary society.
1. Evaluate moral dilemmas in computing using a well-defined theory of ethical decision making. More than one theory is to be covered, and although the list of theories is ultimately left to the discretion of the course instructor, the following are usually covered: Kantianism, utilitarianism, social contract theory, and virtue ethics. For each ethical theory covered in the course, students are expected to:
a. Describe the general steps needed to construct an ethical argument.
b. Research, organize, and synthesize information to support an ethical argument.
c. Critique the organization, language, delivery, audience adaptation, reasoning, arguments, and supporting materials of
ethical arguments presented by others.
d. Author and present an ethical argument that considers language, delivery, and audience awareness.
2. Explain and discuss issues in computing-related to intellectual property.
a. Identify the characteristics of copyright and fair use.
b. Identify the characteristics of software licenses, including free licenses and open source licenses.
c. Identify the characteristics of a patent in computing.
d. Apply an ethical theory to defend an ethical stance in computing related to intellectual property.
3. Explain and discuss issues in computing related to privacy, security, and the government.
a. Identify the characteristics of hacking, hacktivism, and cyberterrorism.
b. Identify and classify privacy infringements in computing.
c. Describe privacy-related government policies and protections.
d. Apply an ethical theory to defend an ethical stance in computing related to privacy, security, and/or the government.
4. Explain and discuss issues in computing-related reliability.
a. Identify the characteristics of safety-critical systems.
b. Identify the stakeholders and characteristics of a well-known case study involving computer and machine reliability (e.g.,
Therac-25, Tesla Version 7.0).
c. Identify characteristics and potential biases related to software engineering.
d. Apply an ethical theory to defend an ethical stance in computing related to the government.
5. Explain and discuss issues in computing related to education, employment, and globalization.
a. Identify characteristics of a digital divide.
b. Identify social justice issues in computing.
c. Identify impacts of automation, remote learning, and remote work.
d. Apply an ethical theory to defend an ethical stance in computing related to education, employment, and/or
globalization.
6. Explain and discuss issues in computing related to professional development.
a. Identify characteristics and responsibilities related to professions that intersect with computing.
b. Identify the characteristics of professional codes of ethics.
c. Identify characteristics that make whistleblowing morally permissible and morally required.
d. Apply an ethical theory to defend an ethical stance in computing related to professional development. |