Case - Dan Dunlap

advertisement
Case Introduction
Final Case Study


Topic for Case Study
Brief outline of the case to be covered for the final
presentation
• Who
• What
• Where
• When
• What topic will the case illuminate?
10
- 15 min max
Case
(focused) Drives Topic
Audio/Visuals
Appropriate
Help Guide Audience
Detail and Depth
 Focus
on a SINGLE case and examine a
focused topic THROUGH a case study
 A well-defined, specific case study
 Engages a relevant topic through the case
 Requires complex understanding of the
issues
 Use
A/V to help the audience
• FOLLOW the discussion
• present data
• summarize
 Bullet
or summary points that follow
• intro-body-summary
• to help audience follow organization
 A/V
goes beyond text or summary of oral
presentation. To include guiding such as
• Mood
• positive, negative
• pro, con
 Meaningful
and dynamic graphic
representations such as
• Video
• Overlay
• animation.
 Details
of topic follow naturally and fluidly
from discussion of case.
 Issues
and crux (THE BIG POINT) emerge
from the discussion of a case.
 Case
goes deep rather than broad.
 ORGANIZATION
!!!!
• Introduction outlines presentation.
 Attention getter
 signpost
 thesis (case, topic, controversy, etc.)
• Body
 talking points or study
 thesis idea
 ALL points support and develop the case
• Summary
 reiterates topic and main issue of case
 clarifies structure
 lesson, controversy
 Out
of 20 points
 Submitted outline / Sign up
 Presented when scheduled
 Organization
 CASE , NOT “Topic”
 Presentation
should follow organizational
structure and guidelines emphasized in the
course.
 Required:
• Intro: Signpost / Outline of talk
• Organization obvious throughout
 Visual clues or labels for slides
 Color, Breadcrumb navigation, point of view
• CASE:
 Details of topic follow from discussion of case
 Topic details and issues are explained through a
discussion of a specific case study.
 Do NOT present a topic. The case will be topical
• The crux of the topic emerges in the context of the
discussion of the specific case.
 Intro:
• Attention Getter
• Sign Post (This case is …)
• Tension or conflict of the case
 Body
• FACTS of the case (without commentary)
• Sides or multiple points of view
• Resolution, Judgment, Settlement
 Conclusion
• Justice? WHY?
• Commentary? “The problem here is…”
• Tension and questions unresolved or needed

Audio Visual:
• A/V materials go beyond text or simple summary of
words presented orally
• Visual representation of the organization of material
• Where are you in the outline? (If I leave and come back?)
 Bullet or summary points that follow intro-body-summary to
help audience follow structure and points
 Breadcrumb navigation
 color slides,
• Affective guiding (mood, positive/negative, etc.)
 Viewpoint: pro / con, Judge, side/person,
• Video, overlay, and/or meaningful and guiding graphic
representations.
 Data or complex info represented visually
 Be sure to label axis and make it EASY TO UNDERSTAND !!
 Details:
Be sure to focus on a SINGLE case
 Examine a focused topic THROUGH a case
study (rather than vise versa).
 Details focus on CASE, NOT “Topic”
 Any topic emerges from case
 Case drives topic
• Don’t bother explaining the topic
• Topics are clear to us.
• Give us DETAILS of the case
• Focus on the key tension or conflict rather than
your feeling about the lesson or point.
 Hacker
Ethics
 Security
 Privacy
 Philosophy of
Technology
 Open Source
 Codes of Ethics
 Copyrights
 Patents
 Policy Vacuums
 Computing Sciences
 Cybernetics
 Computing
Metaphors
 The Patriot Act
 Other
CASE STUDIES of
cyber-ethics
 Conceptual muddle or
policy vacuum





Microsoft Antitrust case
Recent Supreme Court case on file
sharing software
Internet censorship -- Recent case of
Google censored in China
Cases of ethics and usability,
requirements, user-centered design
ADA requirements
SPAM, email tax, email fees
Workplace monitoring
Industrial espionage
Intellectual property
Privacy
Cyber-Stalking
Database Privacy
Cookies
Identity theft
Big Brother Tech.
Clipper Chip
Carnivore
Anonymity
Netiquette
Free Speech
Hate Speech
Comm. Decency Act
Internet Filters
MP3, Peer to Peer
Piracy
Digital Millennium Copyright Act
Fair Use, Education, and Technology
Licensing
Cyber-War (DoS)
Biotechnology Ethics
Spamming, Phishing
Identity Fraud
Cyber-squatting
ICANN
Hackers
Liability for defective software
Viruses, worms, and "malware"
Technology obsolescence
Losing jobs to automation
I.T. Outsourcing
Cryptography, encryption
Whistle-blowing
Internet Tax (Freedom Act)
Bundling
Vaporware
Fault Tolerance (network outage)
Simulation Risks
 Library Resources:
• Citations
• Database
• Reference evaluation
Rebecca Miller
MEET IN
Newman 207
What is the most novel ethical issue
introduced by cyber technologies?
Name and describe the most novel (new) ethical issue that
you can think of that has arisen as a result of computer
(cyber) technologies.
Be sure to explain how it is a new ethical issue, and how
computing or cyber technologies give rise to it.
Download