UGA Bulletin Logo

Computing, Ethics, and Society

Social Awareness & Responsibility

Course Description

Introduction to social and ethical issues relating to computer science and information technology. Topics include privacy, intellectual property, open-source software, the digital divide, globalization, professional ethics, social justice issues, and current events. Students should have a working knowledge of personal computing.


Athena Title

Computing Ethics and Society


Equivalent Courses

Not open to students with credit in CSCI 3030E, CSCI 3030H


Prerequisite

ENGL 1050H or ENGL 1102 or ENGL 1102E


Semester Course Offered

Offered spring


Grading System

A - F (Traditional)


Student Learning Outcomes

  • Students will evaluate moral dilemmas in computing using a well-defined theory of ethical decision making.
  • Students will explain and discuss issues in computing related to intellectual property.
  • Students will explain and discuss issues in computing related to privacy, security, and the government.
  • Students will explain and discuss issues in computing related to reliability.
  • Students will explain and discuss issues in computing related to education, employment, and globalization.
  • Students will explain and discuss issues in computing related to professional development.

Topical Outline

In the following learning outcomes, the phrase "in computing" is to be interpreted as scenarios that intersect with the legality, societal impact, creation, deployment, interaction, or withdrawal of software and computing/information technology in contemporary society. 1. Evaluate moral dilemmas in computing using a well-defined theory of ethical decision making. More than one theory is to be covered, and although the list of theories is ultimately left to the discretion of the course instructor, the following are usually covered: Kantianism, utilitarianism, social contract theory, and virtue ethics. For each ethical theory covered in the course, students are expected to: a. Describe the general steps needed to construct an ethical argument. b. Research, organize, and synthesize information to support an ethical argument. c. Critique the organization, language, delivery, audience adaptation, reasoning, arguments, and supporting materials of ethical arguments presented by others. d. Author and present an ethical argument that considers language, delivery, and audience awareness. 2. Explain and discuss issues in computing-related to intellectual property. a. Identify the characteristics of copyright and fair use. b. Identify the characteristics of software licenses, including free licenses and open source licenses. c. Identify the characteristics of a patent in computing. d. Apply an ethical theory to defend an ethical stance in computing related to intellectual property. 3. Explain and discuss issues in computing related to privacy, security, and the government. a. Identify the characteristics of hacking, hacktivism, and cyberterrorism. b. Identify and classify privacy infringements in computing. c. Describe privacy-related government policies and protections. d. Apply an ethical theory to defend an ethical stance in computing related to privacy, security, and/or the government. 4. Explain and discuss issues in computing-related reliability. a. Identify the characteristics of safety-critical systems. b. Identify the stakeholders and characteristics of a well-known case study involving computer and machine reliability (e.g., Therac-25, Tesla Version 7.0). c. Identify characteristics and potential biases related to software engineering. d. Apply an ethical theory to defend an ethical stance in computing related to the government. 5. Explain and discuss issues in computing related to education, employment, and globalization. a. Identify characteristics of a digital divide. b. Identify social justice issues in computing. c. Identify impacts of automation, remote learning, and remote work. d. Apply an ethical theory to defend an ethical stance in computing related to education, employment, and/or globalization. 6. Explain and discuss issues in computing related to professional development. a. Identify characteristics and responsibilities related to professions that intersect with computing. b. Identify the characteristics of professional codes of ethics. c. Identify characteristics that make whistleblowing morally permissible and morally required. d. Apply an ethical theory to defend an ethical stance in computing related to professional development.


Institutional Competencies

Social Awareness & Responsibility

The capacity to understand the interdependence of people, communities, and self in a global society.



Syllabus