master syllabus. - DePaul University

Philosophical Inquiry
Domain Application Form
1. Course Title CSC 208 The Computer and Social Responsibility
2. Issues course within the Philosophical Learning Domain
3. Department/Program
Proposed by Evelyn Lulis, CTI
4. Course Description:
Information Technology and the rapid pace in which it has advanced have had a tremendous impact on our
lives. Changes have been swift and the human capacity to deal them limited. It has been said that our
technology has outpaced our humanity. This course will research the new responsibilities technology
presents and our ability to deal with these changes in an ethical manner. Students will employ ethical
frameworks, which integrates computer science and ethics, to develop the skills required to examine
different sets of assumptions and question them. Case studies will provide a historical perspective for
analysis.
Topics Include:
1. An overview of Computer Ethics
2. Ethical theories and Analysis Methods
3. Digital Divide (Multicultural Issues)
4. Ethics and the Internet
5. Privacy and Information Access
6. Freedom of Speech in cyberspace
7. Ethical Issues and Information security
8. Computer ethics in the workplace
9. Intellectual Property
10. Liability, Reliability, and Safety Issues
11. Networks
5. Reasons for Inclusion in Liberal Studies as Part of the Philosophical Inquiry Domain
Information technology is moving at a fast pace. Jim Moor stated that “new technologies create policy
vacuums and the study of computer ethics is to fill these vacuums” (Johnson, 2001). Students today face
many ethical issues regarding technology and need to be equipped to make ethical choices. The use of
case studies will present a historical perspective for examining issues. Some questions this course
addresses:
Does everyone have the right to information technology? How can information technology be provided to
all? What are the costs? What cultural differences exist? Should cultural differences be considered when
making decisions on the right to privacy? What cultural issues should be considered when analyzing privacy
on a global level? What is private and what is not? Should the Internet be censured? Does everyone have a
“natural” right to privacy? What constitutes personal information? What cultural issues should be considered
when defining what is private? Do the laws governing printed documents apply to electronic documents?
What constitutes computer crime? Should the FBI continue using Carnivore? Who is responsible for
computer errors? Who is liable when a medical expert system fails? Are we too dependent on computers?
6. Critical and creative thinking
Students will learn how to conduct ethical analyses on issues and develop these skills through writing
analytical papers, weekly writing submissions, essay midterm, and a final project requiring the writing of a
code of ethics. Students will examine different sets of assumptions in light of technological issues and
question them—how they apply, should they be accepted. A conceptual framework, as described by
Spinello and Johnson, will be employed.
7. Multicultural perspective
Multicultural aspects will be addressed when dealing with access issues on a local, national, and
international basis. The ethical issues of technology will be addresses on various levels—individual,
organizational, national, global, and cultural.
8. Reasons for inclusion in the domain as shown in a commitment to emphasis on philosophical
issues and methods.
This course is an ethics course dealing with information technology. Issues regarding the ethical use of
computing technology will be examined using traditional frameworks for ethical analysis.
9. Pedagogical Approaches
Lectures

Class lectures

Lecture and discussion
Writing intensive:

Weekly Blackboard/COL submissions that are graded

Weekly Blackboard/COL submissions also offer an opportunity for peer review/edit

Analytic papers, feedback, and rewriting
The use of active learning pedagogies:

Active collaborative learning while working in pairs to write code of ethics

Debates
Blackboard/COL discussions

Weekly writing submission may generate discussions
Use of group projects

Debates will be group efforts.

Class discussion will also provide the opportunity to work in groups.

Final project could require working in pairs on ethics code

Original research requirement for debates and ethics code
Original research requirement

An emphasis on original rather than secondary works is provided by the required Blackboard/COL
journal, newspaper, and Internet reading assignments.
10. Assessment strategies
One essay exam (Midterm).
This course is writing intensive: students will write weekly Blackboard/COL postings that are graded and
allowing for peer review/edit.
Students will write two ethical analyses on relevant issues, with the option of participating in a debate
regarding relevant issues.
Students will write a position paper.
There will be a final project in lieu of a final exam will students will write their own code of ethics annotated
with justifications.
Grades will also be based on class participation.
11. Syllabus – attached
CSC 208 The Computer and Social Responsibility
Summary of the course
Information Technology and the rapid pace in which it has advanced have had a
tremendous impact on our lives. Changes have been swift and the human capacity to deal
them limited. It has been said that our technology has outpaced our humanity. This course
will research the new responsibilities technology presents and our ability to deal with
these changes in an ethical manner. Students will employ a framework for ethical
analysis, which integrates computer science and ethics, to develop the skills required to
examine different sets of assumptions and question them, resulting in an informed
evaluation of issues.
Textbooks and printed resources
Required Text:
1. Quinn, M. J. (2005) Ethics for the Information Age. NY:Pearson/Addison Wesley.
This new text contains an introduction to ethics—Subjective Relativism, Cultural Relativism, Divine
Command Theory, Kantianism, Act Utilitarianism, Rule Utilitarianism, Social Contact Theory, and a
comparison of all—and uses these theories throughout the text to provide ethical evaluations of the
topics covered. See: http://www.aw-bc.com/catalog/academic/product/0,1144,0321194349,00.html
for a complete table of contents.
2. Spinello, R. (2003) Case Studies in Information Technology Ethics, 2nd ed. Upper Saddle River,
NJ: Prentice Hall. See:
http://www.informit.de/main/main.asp?page=home%2Fbookdetails&ProductID=33485&SID=%7BF
52AF202%2D7662%2D43F5%2DBC66%2D76F50409F351%7D
A copy of both texts can be provided for viewing.
Supplementary Reading:
1.
Baase, S. (2003) A Gift of Fire, 2ed. Upper Saddle River, NJ: Prentice Hall.
2.
George, J. editor (2004) Computers in Society, Upper Saddle, NJ: Prentice Hall.
3.
Johnson, Deborah (2001). Computer Ethics, 3rd ed. Upper Saddle River, NJ: Prentice
Hall.
Possible web site:
WWW Ethics Center for Engineering and Science at http://web.mit.edu/ethics/www/.
ACM SIGCAS site.
Prerequisites
No previous knowledge of computers or philosophy is assumed or necessary.
Assignments and Grading
Possible assignments:
 One essay exam (Midterm) 20%
 Students will write weekly Blackboard/COL—minimum of two pages—postings
that are graded and allow for peer review/edit. These papers should include an
analysis of a relevant topic using the toolbox of ethical theories covered in weeks
one and two. 10%
 Students will write three ethical analyses papers on relevant issues explicitly
applying the ethical theories discussed during the first two weeks of class. There
will be an optional debate regarding relevant issues. 40%
 There will be a final project in lieu of a final exam will students will write their
own code of ethics annotated with justifications that provide a full-fledged
rationale for the student's choice of principles. 20%
 Grades will also be based on class participation: 10%
Week 1
Introduction to course; review syllabus; a brief history of computing. A thorough
examination of philosophical theories and ethical frameworks used for ethical analysis:
Kantian, descriptive and normative claims, ethical relativism, utilitarianism (act and rule),
deontological theories, rights, duty-based ethics, virtue, individual and social policy
ethics, social contract.
Readings:
1. Quinn, Chapter 1 and 2
2. Spinello, Chapter 1
Supplemental Readings:
1. Johnson, Chapters 1 and 2
Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of
chapter exercises—using the toolbox of ethical theories we are covering. Post this paper
on the COL site.
Week 2
Ethical Theories continued
Readings:
1. Quinn, Chapter 2 continued. A thorough examination of the ethical theories and
examples of their application.
2. Spinello, Chapter 1
Supplemental Readings:
1. Johnson, Chapters 1 and 2
Assignment One: Write a five page ethical analysis paper one of the topics discussed in
the text—see end of chapter exercises, explicitly applying the ethical theories discussed
during the first two weeks of class.
Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of
chapter exercises—using the toolbox of ethical theories we are covering. Post this paper
on the COL site.
Week 3
Networking
Email and spam; Ethical evaluation of Spamming—Kantian, act utilitarian, rule
utilitarian, social contract; MAPS and its evaluation—social contract, utilitarian, Kantian;
pornography, censorship—Kant, Mill; freedom of expression; ethical evaluation of
CIPA—Kantian, act utilitarian, social contract.
Reading:
1. Quinn, Chapter 3
2. Spinello, Chapter 2
Case studies:
1. CHIPA
2. Multnomah Public Library vs. US
3. Censorship at New England University
4. Jake Baker
5. Compuserve Deutschland
Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of
chapter exercises—using the toolbox of ethical theories we covered. Post this paper on
the COL site; peer-edit the ones that were posted last week.
Week 4
Intellectual Property
Information Technology and anti-competitive pricing
What is intellectual property? What constitutes fair use? Is it wrong to copy software? Is
it wrong to download music? What issues was pertinent regarding the Microsoft case?
What the outcome fair? Right-Based analysis and utilitarian analysis of intellectual
property rights; proprietary software—social contract theory, Kantian perspective, rule
utilitarian, act utilitarian.
Reading:
1. Quinn, Chapter 4
2. Spinello, Chapter 3 and 4
Supplemental Readings:
1. Johnson, Chapter 6
2. Case studies:
a. The Napster Case
b. Notes on software compatibility and reverse engineering
c. The US Government vs. Microsoft
d. Ditto.com
d Search Engine Baiting
e. Spiders at the Auction
Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of
chapter exercises—using the toolbox of ethical theories we covered. Post this paper on
the COL site; peer-edit the ones that were posted last week.
Week 5
Freedom of Speech and Privacy in Cyberspace
Privacy and Information Access
Data mining and privacy
What is privacy? Is there a right to privacy? Does everyone have a “natural” right to
privacy? Should some Internet sites be censored? Is the FBI’s Carnivore needed? Should
the FBI continue using Carnivore? Dos the government have the right to censure
information? Two points of view on privacy: individual privacy vs. society. Should
cultural differences be considered when making decisions on the right to privacy? What
constitutes personal information? What cultural issues should be considered when
defining what is private?
Reading:
1. Quinn, Chapter 5
2. Spinello, Chapter 5
Supplemental Readings:
1. Baase, Chapter 5 Freedom of Speech in Cyberspace
2. George Part 2: Privacy In the Age of Terror
3. Johnson, Chapter 5
4. George (2004) Free speech and the Internet
5. Case studies:
a. The Patriot Act
b. The FBI’s carnivore technology
c. Security Breach at IKON
d. HIPPA
e. Crypto Wars
Assignment Two: Write a five page ethical analysis paper on one of the topics discussed
in the text, explicitly applying the ethical theories discussed during the first two weeks of
class.
Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of
chapter exercises—using the toolbox of ethical theories we covered. Post this paper on
the COL site. Peer-edit the ones that were posted last week.
Week 6
Ethical Issues and Information/Network Security
Viruses, worms, Trojan horses, phreaks and hackers, denial-of-service attacks, and online
voting. The Robert Morris case evaluated—Kantian, social contract, utilitarian. Stewart
Nelson evaluated—social contract theory, Kantian, rule utilitarian, act utilitarian,
Reading:
1. Quinn, Chapter 6
2. Spinello, Chapter 6
Supplemental Readings:
1. Baase, Chapter 3 Encryption and Interception of Communication
2. Baase, Chapter 8 Computer Crime
3. Case Studies:
f. A Harmless Prank
g. Hactivism
h. The Case of Craig Neidorf
Week 7
Computer Reliability
Liability, Reliability, and Safety Issues
Who is responsible for computer errors? Who is liable when a medical expert system
fails? Are we too dependent on computers? What criteria should be used to evaluate
computer models? Are software warranties enforceable? All cases evaluated using
Kantian, descriptive and normative claims, ethical relativism, utilitarianism (act and rule),
rights, duty-based ethics, virtue, and individual and social policy ethics.
Reading:
1. Quinn, Chapter 7
2. Spinello, Chapter 7
Supplemental Readings:
1. Johnson, Chapter 4 and 8
2. Baase chapter 4 Can we trust the computer?
3. Case studies:
a. THERAC-25 Radiation Overdoses
b. Intel’s Pentium Chip Product Controversy
c. Sun Server’s Problems
d. Chicago
e. Patriot Missile
f. AT&T long distance
Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of
chapter exercises—using the toolbox of ethical theories we covered. Post this paper on
the COL site. Peer-edit the ones that were posted last week.
Week 8
Work and Wealth
Digital Divide (Multicultural Issues)
Does everyone have the right to information technology? How can information
technology be provided to all? What are the costs? What cultural differences exist?
Automation and unemployment; workplace changes; globalization. All cases evaluated
using Kantian, descriptive and normative claims, ethical relativism, utilitarianism (act
and rule), deontological theories, rights, duty-based ethics, virtue, individual and social
policy ethics, social contract theories.
Reading:
1. Quinn, Chapter 8
Supplementary Readings:
1. George, Part Four, Digital Divides
2. Warschauer, M. (2002). Reconceptualizing the Digital Divide.
http://www.firstmonday.dk/issues/issue7_7/warschauer/#w8 (April 2004)
3. Baase pg 370-374
4. Johnson (2001), Chapter 8 pg 218-25
5. Case Studies:
a. Note on the Digital Divide Spinello (2003) Case 8.5
Assignment Three: Write a five page ethical analysis paper on one of the topics discussed
in the text using the workable toolbox of ethical theories discussed during the first two
weeks of class. This paper will be used in the debates during the last week of class.
Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of
chapter exercises—using the toolbox of ethical theories we covered. Post this paper on
the COL site. Peer-edit the ones that were posted last week.
Week 9
Professional Ethics
Computer ethics in the workplace
Is it wrong to monitor employees? What is the ethics involving job destruction? Job
creation? As before, the workable toolbox of ethical theories is used to evaluate all
problems: Kantian, descriptive and normative claims, ethical relativism, utilitarianism
(act and rule), deontological theories, rights, duty-based ethics, virtue, individual and
social policy ethics, and social contract. Codes of ethics are examined.
Reading:
1. Quinn, Chapter 9
Supplemental Readings:
1. Baase, Chapter 8 Computers and Work
2. George (2004) Computer-based monitoring
3. Case Studies:
i. E-Mail privacy at Johnson and Dresser
j. The Topper Travel Agency
Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of
chapter exercises—using the toolbox of ethical theories we covered. Post this paper on
the COL site. Peer-edit the ones that were posted last week.
Week 10
Debate on Relevant Ethical Issues
Final Project
Write your own code of ethics annotated with justifications that provide a full-fledged
rationale for your choice of principles.