20_Syllabi2010FallGPeterson - The North Carolina Central

5475 Syllabus
Tentative Syllabus
NORTH CAROLINA CENTRAL UNIVERSITY
SCHOOL OF LIBRARY AND INFORMATION SCIENCES
SLIS 4470OL1/5475: Communication Science
SEMESTER: Fall, 2010
COURSE TIME & LOCATION: Mondays. 6:00PM-8:30PM
INSTRUCTOR: Dr. Gabriel Peterson
TELEPHONE NUMBER: 919-530-6746
E-MAIL: gpeterson@nccu.edu
OFFICE: 323 Shepard Library
OFFICE HOURS: Mon. & Wed. 4PM-6PM. Call or e-mail anytime.
COURSE DESCRIPTION: Introduction to telecommunications concepts,
applications, and services. This class introduces the TCP/IP protocol suite
along with clients and servers for Internet communication, browsing, and
navigation. Examines policy, management, and implementation issues.
Student learning outcomes:
By the end of this course, students will be conversant with:
● Network architecture
● TCP/IP protocol suite and Internet architecture
● Browsing and navigation
● Policy and regulation in telecommunication systems
● Management and implementation
● Computer-Based Information Networks
● Protocols and Network Management
● Telecommunications Systems
● Network Security
COURSE REQUIREMENTS
The student will:
1. Read and interpret readings relating to each week’s topic.
2. Complete all assignments and exams. No late assignments will be
accepted without the instructor’s prior permission.
3. Demonstrate understanding and comfort with the subjects that undergird
the technical side of Information Science.
REQUIRED TEXTBOOKS
Principles of Computer Networks and Telecommunications
By: M. Barry Dumas, Morris Schwartz
Published 2009 by Pearson Prentice Hall Publishers
ISBN: 0-13-167264-9
EVALUATION
The final grade will be determined as follows:
1. Quizzes: 75%
2. Assignments: 10%
3. Final Exam: 15%
CLASS STRUCTURE
Each week, students will:
1. Read & be prepared to discuss the assigned material in class.
1. Complete all assignments & exams.
SLIS 4470/5470 Class Schedule:
Week of August 16: ONLINE: NO FACE TO FACE MEETING
Introduction to LSIS 5475
READING ASSIGNMENT #1: Dumas et al, Chapter 1
Assignment #1:
1a) Join the SLIS students Yahoo! group listserv.
1b) login to Blackboard, post alternate email, submit academic integrity
statement to Blackboard.
Week of August 23: Chapters 2 & 3
Week of August 30: Chapters 4 & 5
Week of September 6: Labor Day Holiday NO CLASS
Week of September 13: Quiz #1 NO CLASS
Week of September 20: Chapter 6 & 7
Week of September 27: Chapter 8 & 9
Week of October 4: Chapter 10
Week of October 11: Quiz #2 NO CLASS
Week of October 18: Chapters 11 & 12
Week of October 25: Chapters 13 & 14
Week of November 1: Quiz #3 NO CLASS
Week of November 8: Chapters 14 & 15
Week of November 15: Chapters 16 & 17
Week of November 22: Thanksgiving Break NO CLASS
Week of November 29: TBA
December 6: Final Exam Distributed
December 12: Final Exam Due NO EXCEPTIONS
ACADEMIC INTEGRITY:
I have a zero tolerance policy regarding academic dishonesty. If you represent
the work of another person as your own, you will receive a grade of 0 on the
entire assignment or exam in question. This policy applies to cheating and to
plagiarism, as defined in NCCU’s Academic Integrity Statement, found below
and at the following
URL:http://www.nccu.edu/academics/liberalarts/history/gradhandbook.cfm
Plagiarism is the unattributed use of another’s work and includes the
representation as your own of material copied from online sources, such as
the Wikipedia.
Cutting and pasting material from online resources is not acceptable behavior
at any academic level and will not be tolerated.
Because we use Blackboard, your work is done on your own and the
instructor depends on your honesty and integrity to do all the work assigned
alone (unless a team is designated). You are promising that you did the work
without assistance from another student and without assisting any other
student. You can use notes and textbooks, you can study with others, but you
must alone answer questions.
North Carolina Central University is dedicated to instilling in its students the
highest principles of integrity and responsibility. In this regard, students are
expected to demonstrate respect for these principles in the performance of
their academic activities. Academic dishonesty, which is a violation of
academic integrity, will be dealt with according to the provisions of the Student
Code of Academic Integrity.
Academic dishonesty is defined as any conduct which is intended by the
student to obtain for him/her or for others an unfair or false evaluation in
connection with any examination or other work for academic credit. Cheating,
fabrication, plagiarism, and complicity are examples of conduct which is
academically dishonest.
Cheating is the unauthorized use of materials in connection with an
examination or other work for academic credit, including, but not limited to (1)
the use of books, notes, outlines, etc. during an examination where the
instructor has not authorized use of such materials or information; (2)seeking
unauthorized materials or information from others in connection with an
examination; (3) giving or attempting to give unauthorized assistance to a
person in connection with an examination; (4) obtaining or attempting to
obtain unauthorized copies of examinations; (5) bringing to an examination, or
attempting to use during an examination, unauthorized answers which have
been prepared before the examination period; (6) copying or attempting to
copy from the work of another student during an examination; and (7)
submitting for evaluation in a course, part or the whole of a work for which
credit has been given previously.
Fabrication is the intentional invention, counterfeiting and/or alteration of
quotations, data, procedures, experiments, sources or other information for
which the student claims authorship in an exercise which he or she submits
with the expectation of receiving academic credit.
Plagiarism is the intentional use of the ideas, words, or work of another
without attribution, when the information they provide is not common
knowledge, either in content or form, and includes, but is not limited to (1)
quoting from the published or unpublished work of another without appropriate
attribution; (2) paraphrasing or summarizing in one’s own work any portion of
the published or unpublished materials of another without attribution; and (3)
borrowing from another’s work information which is not in the domain of
common knowledge.
Complicity is the intentional giving of assistance or the attempt to give
assistance to another for the purpose of perpetrating academic dishonesty.
Other Policies:
Student Support Services for Students with Disabilities
Students with disabilities (physical, psychological, learning disability, etc.) who
would like to request accommodations need to register with the Office of
Student Support Services in Suite G20 in the Student Services Building or by
contacting Kesha Lee, Director at (919)530-6325 or klee@nccu.edu. If you
are already registered in the office, you will need to return to the office each
semester to review your information and receive updated accommodations.
Incomplete grades:
The grade of "I" will be given only in unusual cases and must be resolved
within a time frame agreed upon by instructor and student prior to assignation
Late Assignments: Late homework will be penalized at the rate of 5 points
(half a letter grade) per day of lateness.
Late exams will be penalized at the rate of 10 points per day of lateness.
5141 Syllabus
Tentative Syllabus
NORTH CAROLINA CENTRAL UNIVERSITY
SCHOOL OF LIBRARY AND INFORMATION SCIENCES
SLIS 5451 Databases 1
SEMESTER: Fall, 2010
COURSE TIME & LOCATION: 6:00-8:30 W Shepard Library, Room 324
INSTRUCTOR: Dr. Gabriel Peterson
TELEPHONE NUMBER: 919-530-6746
E-MAIL: gpeterson@nccu.edu
OFFICE: 323 Shepard Library
OFFICE HOURS: Mon. & Wed 4PM-6PM. Call or e-mail anytime.
COURSE DESCRIPTION: Student learning outcomes:
LSIS 5451 is an introduction to databases. No prior understanding of database concepts or use is
assumed. Upon completing the course, students will be able to articulate fundamental concepts in
databases and demonstrate the ability to create, modify and query Microsoft Access databases.
COURSE REQUIREMENTS
The student will:
1. Read the chapter prior to class and participate in the lecture and demonstration.
2. Complete weekly assignments.
3. Show facility in creating, modifying and querying databases.
REQUIRED TEXTBOOKS
Database Concepts, 4e By Kroenke & Auer
Prentice Hall, 2010
ISBN-10: 0136086535
EVALUATION
The final grade will be determined as follows:
1. Assignments: 40%
2. Quizzes: 45%
3. Final Exam: 15%
CLASS STRUCTURE
Beginning with class #2, each student will:
1. Read & be prepared to discuss the assigned material in class.
1. Complete all assignments.
SLIS 5451 Class Schedule:
Week of August 18: Introduction to LSIS 5451 (ONLINE - No face to face meeting)
Review Syllabus, buy Textbook, install Microsoft Access 2007 (or Open Office Base)
Week of August 25: Chapter 1 & 2
Week of September 1: Chapter 3a
Week of September 7: Chapter 3b
Week of September 15: Quiz 1 NO CLASS
Week of September 22: Chapter 4
Week of September 29: Chapter 5
Week of October 6: Chapter 6
Week of October 12: Quiz 2 NO CLASS
Week of October 20: Chapter 7
Week of October 27: Chapter 8
Week of November 3: Quiz 3 NO CLASS
Week of November 10: Appendix B & Database Security
Week of November 17: Web Databases & MySQL
Week of November 24: Thanksgiving holiday – NO CLASS
Week of December 1: Wrap-up and review
Week of December 8: Final exam
December 12: Final Exam Due (NO EXCEPTIONS)
POLICIES:
ACADEMIC INTEGRITY:
I have a zero tolerance policy regarding academic dishonesty. If you represent the work of another
person as your own, you will receive a grade of 0 on the entire assignment or exam in question. This
policy applies to cheating and to plagiarism, as defined in NCCU’s Academic Integrity Statement, found
below and at the following URL:http://www.nccu.edu/academics/liberalarts/history/gradhandbook.cfm
Plagiarism is the unattributed use of another’s work and includes the representation as your own of
material copied from online sources, such as the Wikipedia.
Cutting and pasting material from online resources is not acceptable behavior at any academic level and
will not be tolerated.
Because we use Blackboard, your work is done on your own and the instructor depends on your honesty
and integrity to do all the work assigned alone (unless a team is designated). You are promising that you
did the work without assistance from another student and without assisting any other student. You can
use notes and textbooks, you can study with others, but you must alone answer questions.
North Carolina Central University is dedicated to instilling in its students the highest principles of integrity
and responsibility. In this regard, students are expected to demonstrate respect for these principles in the
performance of their academic activities. Academic dishonesty, which is a violation of academic integrity,
will be dealt with according to the provisions of the Student Code of Academic Integrity.
Academic dishonesty is defined as any conduct which is intended by the student to obtain for him/her or
for others an unfair or false evaluation in connection with any examination or other work for academic
credit. Cheating, fabrication, plagiarism, and complicity are examples of conduct which is academically
dishonest.
Cheating is the unauthorized use of materials in connection with an examination or other work for
academic credit, including, but not limited to (1) the use of books, notes, outlines, etc. during an
examination where the instructor has not authorized use of such materials or information; (2)seeking
unauthorized materials or information from others in connection with an examination; (3) giving or
attempting to give unauthorized assistance to a person in connection with an examination; (4) obtaining
or attempting to obtain unauthorized copies of examinations; (5) bringing to an examination, or attempting
to use during an examination, unauthorized answers which have been prepared before the examination
period; (6) copying or attempting to copy from the work of another student during an examination; and (7)
submitting for evaluation in a course, part or the whole of a work for which credit has been given
previously.
Fabrication is the intentional invention, counterfeiting and/or alteration of quotations, data, procedures,
experiments, sources or other information for which the student claims authorship in an exercise which he
or she submits with the expectation of receiving academic credit.
Plagiarism is the intentional use of the ideas, words, or work of another without attribution, when the
information they provide is not common knowledge, either in content or form, and includes, but is not
limited to (1) quoting from the published or unpublished work of another without appropriate attribution;
(2) paraphrasing or summarizing in one’s own work any portion of the published or unpublished materials
of another without attribution; and (3) borrowing from another’s work information which is not in the
domain of common knowledge.
Complicity is the intentional giving of assistance or the attempt to give assistance to another for the
purpose of perpetrating academic dishonesty.
Other Policies:
Student Support Services for Students with Disabilities
Students with disabilities (physical, psychological, learning disability, etc.) who would like to request
accommodations need to register with the Office of Student Support Services in Suite G20 in the Student
Services Building or by contacting Kesha Lee, Director at (919)530-6325 or klee@nccu.edu. If you are
already registered in the office, you will need to return to the office each semester to review your
information and receive updated accommodations.
Incomplete grades:
The grade of "I" will be given only in unusual cases and must be resolved within a time frame agreed
upon by instructor and student prior to assignation
Late Submissions: Late assignments will be penalized at the rate of 5 points (out of 100) per day. Late
exams will not be accepted.
5442 Syllabus
TENTATIVE SYLLABUS
NORTH CAROLINA CENTRAL UNIVERSITY
SCHOOL OF LIBRARY AND INFORMATION SCIENCES
COURSE: NETWORK SECURITY (LSIS 5442-01)
SEMESTER: Fall 2010
TIME & LOCATION:
MONDAYS, 6:00-8:30PM,
325 SHEPARD LIBRARY & OTHER LOCATIONS AS ANNOUNCED
INSTRUCTOR: DR. GABRIEL PETERSON
TELEPHONE NUMBER: (919) 530-4676
E-MAIL (Preferred): GPETERSON@NCCU.EDU
OFFICE HOURS: 4-6PM M-Tu. E-mail anytime.
COURSE DESCRIPTION: The principal concepts of network security will be
introduced. Topics such as cryptography, encryption, authentication, denial-ofservice attacks, worms, viruses, intrusion detection, firewalls, virtual private
network, Web security, and access control of the network systems.
STUDENT LEARNING OUTCOMES:
By the end of this course, students will understand threats to network security
and how to defend and harden systems and networks.
Upon completion of SLIS 5442, students will be able to demonstrate skills in
the analysis of security weaknesses in computer systems and in the defense
of such weaknesses. Students will gain practical experience in the defense of
networks and network equipment and be able to detail the primary areas of
network defense through the use of the program NMAP and others.
COURSE INTRODUCTION:
This course is intended to give students a practical introduction to the tools
and skills required of a network security analyst. Such tools are often
perceived by networks (and their administrators) as being security threats.
Hence, we will not be able to use all of the tools if we limit ourselves to
NCCU’s tightly secured network; we will need to find open networks where we
can work with the security tools available to network security analysts.
Network security tools used by professionals are typically UNIX or Linuxbased. We will use these tools. Thus, you will need to develop a working
knowledge of Linux. You must therefore start using Linux, either as an
installed operating system it as a live USB or CD CD.
I strongly recommend that you prepare a 4Gb (or larger) live USB drive.
Information about this process can be found
here: http://www.ubuntu.com/desktop/get-ubuntu/download
For more information about Ubuntu, please visit this
website: http://www.ubuntu.com/
COURSE REQUIREMENTS:
HARDWARE REQUIREMENTS:
IN ORDER TO USE THE TECHNOLOGY THAT UNDERPINS THIS CLASS
YOU MUST HAVE (AT THE MINIMUM)
* A LAPTOP EQUIPPED WITH WIRELESS INTERNET CAPABILITY
* A DISTRIBUTION OF LINUX INSTALLED OR AVAILABLE VIA LIVE BOOT
The student will:
Read and interpret selected material relating to each week’s topic.
Complete all assignments. No late assignments will be accepted without the
instructor’s knowledge.
Demonstrate increasing understanding and comfort with the subjects that
undergird of network security
TEXTBOOKS:
(*Note: I recommend getting some of these books at the local library. Some
are former bestsellers, so you should be able to find them for free or close to
it. All texts are available for sale used online. )
CompTIA Security + Study Guide
BY: Mike Pasture & Emmett Delaney
Wiley Publishing, Inc. (Skybox)
ISBN-10: 0470036680
ISBN-13: 978-0470036686
Cyber War: The Next Threat to National Security
by Richard A. Clarke, Robert Knake
ISBN-10: 0061962236
(*Note: I recommend getting this book at the local library. Its a current
bestseller, so you should be able to find it for free or close to it)
Secrets and Lies by Bruce Schneier
ISBN-10: 0471453803
Wiley Publishing, Inc.
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
by Stuart McClure, Joel Scambray, and George Kurtz
Publisher: McGraw-Hill Osborne Media; 6 edition (January 5, 2009)
ISBN-10: 0071613749
The Art of Deception
by Kevin Mitnick
Publisher: Wiley
ISBN-10: 076454280X
Suggested Supplemental Readings:
The Code Book by R.Singh
The Linux Pocket Guide O’Reilly Publishers
Nmap Reference Guide - http://nmap.org/book/man.html
COURSE EVALUATION
Quizzes: 40%
Assignments: 30%
Final Exam: 30%
COURSE SCHEDULE
SLIS 5442OL1 Readings Schedule:
Week of August 18:
Prepare bootable Ubuntu USB drive or CD.
Begin reading Cyber War: The Next Threat to National Security by Richard A.
Clarke
Week of August 25:
Pasture & Delaney GENERAL SECURITY CONCEPTS (CHAPTERS 1 & 2)
HACKING EXPOSED CHAPTER 1 & 2 (Scanning & Footprinting)
Command line assignment distributed: (Ping, ifconfig, etc)
Week of September 1:
HACKING EXPOSED CHAPTER 3 - Enumeration
Pasture & Delaney INFRASTRUCTURE AND CONNECTIVITY (CHAPTER 3)
Work on Command line assignment: (Ping, ifconfig, etc)
Week of September 7:
Quiz 1 (Includes Clark, Pasture & Delaney & hacking exposed to Ch. 3)
Assignment Due: Command line assignment: (Ping, ifconfig, etc)
Week of September 15:
Pasture & Delaney MONITORING ACTIVITY AND INTRUSION DETECTION
(CHAPTER 4)
HACKING EXPOSED CHAPTER 4 - Hacking Windows
Week of September 22:
Pasture & Delaney IMPLEMENTING AND MAINTAINING A SECURE
NETWORK (CHAPTER 5)
HACKING EXPOSED CHAPTER 5 - Hacking UNIX
Week of September 29: Quiz 2
Week of October 6:
Pasture & Delaney SECURING THE NETWORK AND ENVIRONMENT
(CHAPTER 6)
HACKING EXPOSED (CHAPTER 6) - Remote Connectivity
Week of October 12:
HACKING EXPOSED Chapter 7 - Network Devices
Begin reading Secrets and Lies Schneier
Pasture & Delaney (CHAPTER 7) – CRYPTOGRAPHY
Week of October 20:
Pasture & Delaney (CHAPTER 8) - Policies & procedures
HACKING EXPOSED Chapter 8 - Wireless Hacking
NMAP assignment distributed
Week of October 27:
Pasture & Delaney (CHAPTER 9) - Security management
Security Management H ACKING EXPOSED Chapter 9 - Hacking Hardware
Week of November 3: Quiz 3
Week Of November 10:
HACKING EXPOSED Chapter 10 & 11 (Hacking Code & Web Hacking)
Pasture & Delaney - Appendix A
Week of November 17:
HACKING EXPOSED CHAPTER 12 - Hacking the Internet User
Finish Supplemental Readings: The Art of Deception by Kevin Mitnick
Week of November 24: Thanksgiving holiday – NO CLASS
Week of December 1: Quiz 4
Week of November 17:
NMAP Assignment Due
Week of December 8: Final exam
ACADEMIC INTEGRITY:
I have a zero tolerance policy regarding academic dishonesty. If you represent
the work of another person as your own, you will receive a grade of 0 on the
entire assignment or exam in question. This policy applies to cheating and to
plagiarism, as defined in NCCU’s Academic Integrity Statement, found below
and at the following
URL:http://www.nccu.edu/academics/liberalarts/history/gradhandbook.cfm
Plagiarism is the unattributed use of another’s work and includes the
representation as your own of material copied from online sources, such as
the Wikipedia.
Cutting and pasting material from online resources is not acceptable behavior
at any academic level and will not be tolerated.
Because we use Blackboard, your work is done on your own and the
instructor depends on your honesty and integrity to do all the work assigned
alone (unless a team is designated). You are promising that you did the work
without assistance from another student and without assisting any other
student. You can use notes and textbooks, you can study with others, but you
must alone answer questions.
North Carolina Central University is dedicated to instilling in its students the
highest principles of integrity and responsibility. In this regard, students are
expected to demonstrate respect for these principles in the performance of
their academic activities. Academic dishonesty, which is a violation of
academic integrity, will be dealt with according to the provisions of the Student
Code of Academic Integrity.
Academic dishonesty is defined as any conduct which is intended by the
student to obtain for him/her or for others an unfair or false evaluation in
connection with any examination or other work for academic credit. Cheating,
fabrication, plagiarism, and complicity are examples of conduct which is
academically dishonest.
Cheating is the unauthorized use of materials in connection with an
examination or other work for academic credit, including, but not limited to (1)
the use of books, notes, outlines, etc. during an examination where the
instructor has not authorized use of such materials or information; (2)seeking
unauthorized materials or information from others in connection with an
examination; (3) giving or attempting to give unauthorized assistance to a
person in connection with an examination; (4) obtaining or attempting to
obtain unauthorized copies of examinations; (5) bringing to an examination, or
attempting to use during an examination, unauthorized answers which have
been prepared before the examination period; (6) copying or attempting to
copy from the work of another student during an examination; and (7)
submitting for evaluation in a course, part or the whole of a work for which
credit has been given previously.
Fabrication is the intentional invention, counterfeiting and/or alteration of
quotations, data, procedures, experiments, sources or other information for
which the student claims authorship in an exercise which he or she submits
with the expectation of receiving academic credit.
Plagiarism is the intentional use of the ideas, words, or work of another
without attribution, when the information they provide is not common
knowledge, either in content or form, and includes, but is not limited to (1)
quoting from the published or unpublished work of another without appropriate
attribution; (2) paraphrasing or summarizing in one’s own work any portion of
the published or unpublished materials of another without attribution; and (3)
borrowing from another’s work information which is not in the domain of
common knowledge.
Complicity is the intentional giving of assistance or the attempt to give
assistance to another for the purpose of perpetrating academic dishonesty.
Other Policies:
ADA compliance: Please inform the instructor if you have special needs that
need to be accommodated; every effort will be made to accommodate
individuals with special needs.
Incomplete grades: The grade of "I" will be given only in unusual cases and
must be resolved within a time frame agreed upon by instructor and student
prior to assignation
Late Assignments: Late homework will be penalized at the rate of 5 points
(half a letter grade) per day of lateness.
Late exams will be penalized at the rate of 10 points per day of lateness.
TENTATIVE Syllabus for LSIS 5110 Information Policy
Summer 2010
North Carolina Central University
School of Library and Information Sciences
COURSE: Information Policy (LSIS 5110-D)
SEMESTER: Summer Session 1 2010 – May 21-June 25
TIME & LOCATION: Online
INSTRUCTOR: Dr. Gabriel Peterson
TELEPHONE NUMBER: (919) 530-6746
E-MAIL: gpeterson@nccu.edu
OFFICE HOURS: By appointment. Call or e-mail anytime.
COURSE INTRODUCTION: The course will examine information policies, particularly at
the federal and international levels with special emphasis on cyber-warfare and the US's
current posture regarding that issue. Other issues of interest include policy issues such
as net neutrality and personal rights.
COURSE DESCRIPTION: Matching information systems policy to the information
needs of an organization, and investigating issues relating to management and
administration of the information systems functions.
STUDENT LEARNING OUTCOMES: Upon completing LSIS 5110, students will be able
to articulate the need for and practices of implementation of Information Policy in
diverse organizations.
COURSE REQUIREMENTS: The student will read and interpret selected material
relating to each week’s topic and complete all assignments. No late assignments will be
accepted without the instructor’s prior approval.
BLACKBOARD & CLASS COMMUNICATION: All class interactions will occur on
Blackboard and via nccu.edu email. You should check both Blackboard and your
NCCU email daily. Assignments can be submitted via the Digital Dropbox in .doc or .rtf
format. All class communication will be mediated via the discussion board so that all
information can be shared universally. Further, because campus email employs an
aggressive spam filter, email sent to my nccu.edu account may not arrive in a timely
manner. Thus, PLEASE POST ANY CLASS RELATED QUESTIONS TO THE “DR.
PETERSON'S OFFICE” FORUM ON BLACKBOARD
REQUIRED TEXTS :
Cyber War: The Next Threat to National Security and What to Do About It
By Richard Clarke ISBN-10: 0061962236
Inside Cyber Warfare: Mapping the Cyber Underworld
By Jeffrey Carr ISBN-10: 0596802153
Note: Start reading these books as soon as you get them so that you will be able
to discuss them in a few weeks
Grading criteria:
Class participation: 20%
Final: 20% (Due June 25)
Critical reviews: 60%
Critical reviews: Students will prepare critical reviews based on the readings and class
discussions. Critical reviews will be prepared for each of the 4 major subject areas:
Due May 30: Information Policy in Organizations – Introduction to policy issues
Due June 6: US-Domestic Information Policy – Net Neutrality & Spectrum Regulation
Due June 13: US-International Information Policy – National Security & Cyber-war
Due June 20: Information Policy and the Individual – Privacy, censorship & the open
society
Critical reviews will consist of an analysis of course material with special attention given
to discussion topics outlined week-by-week. Reviews should be thorough,
grammatically correct and properly cited. (Secondary and tertiary online sources such
as Google, Wikipedia, or Slashdot are not acceptable source material for academic
work). I will not give you a word maximum or minimum, just do a complete and thorough
job, and remember that your work will be graded on a curve, in comparison to that of
your peers, so do your best.
I have a zero tolerance policy for plagiarism, (the unattributed use of
another's work as your own). Plagiarism will result in the receipt of a
zero for an assignment for a first offense and a second offense will
result in ejection from the MIS program. See the end of the syllabus
for details.
Course schedule/calendar:
Week 1: May 21 - Introduction to Information Policy:
Readings: Rubin, Ch 4 (pdf available on Blackboard)
Read: US Government Information Policy by Varian and Shapiro:
http://people.ischool.berkeley.edu/~hal/Papers/policy/policy.html
“Analysis of The Telecommunications Act of 1996”
http://www.oswego.edu/~messere/telcom1.html
Begin reading the Cyber-war texts
Critical Review #1 (Due May 30): Information Policy in Organizations – Introduction to
policy issues
Discussion questions:
What areas must an information policy for an organization encompass?
What are the information policies of your employer?
What are your personal information policies?
Week 2: May 28 – Federal Information Policy US-Domestic Information Policy – Net Neutrality & Spectrum Regulation
Readings: The "New economy" and Information Technology Policy by Pamela
Samuelson &
Hal Varian available at:
http://people.ischool.berkeley.edu/~pam/papers/infopolicy
Network Neutrality, Broadband Discrimination
Journal of Telecommunications and High Technology Law, Vol. 2, p. 141, 2003
by Tim Wu
(available from:
http://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=159088)
Critical Review #2 (Due June 6): US-Domestic Information Policy – Net Neutrality &
Spectrum Regulation
Discussion questions:
What are the challenges regulators face when dealing with technological
innovation?
Net neutrality is a hotly contested subject at the moment with various industry
and consumer groups vying to shape public policy to their liking.
What is net neutrality?
How is net neutrality defined by the parties involved?
What is the current regulatory posture of the US government regarding net
neutrality?
Weeks 3 & 4: June 4 - 11 – US-International Information Policy
Reading assignment:
Cyber War: The Next Threat to National Security and What to Do About It
By Richard Clarke ISBN-10: 0061962236
Inside Cyber Warfare: Mapping the Cyber Underworld
By Jeffrey Carr ISBN-10: 0596802153
Critical Review #3 (Week of June 13): US-International Information Policy – National
Security & Cyber-war
Discussion questions:
What are the primary threats identified by the Cyber-War texts you have read?
What is the US policy towards each of these threats?
What transnational information flow issues confront the US?
What transnational information flow issues confront the global Internet
community?
Week 5: June 14 – Information Policy and the Individual – Privacy, censorship &
the open society
Reading assignment:
http://www.schneier.com/blog/archives/2006/05/the_value_of_pr.html
FURTHER READINGS TO BE ASSIGNED
Critical Review #4 (Due June 20): Information Policy and the Individual – Privacy,
censorship & the open society
Discussion questions:
What is privacy?
What is the nature of privacy on the Internet from an engineering perspective?
What is the nature of privacy on the Internet from a business perspective?
What is the nature of privacy on the Internet from a personal perspective?
Week 6: June 25 – Final exam due
POLICIES:
ACADEMIC INTEGRITY:
I have a zero tolerance policy regarding academic dishonesty. If you represent the
work of another person as your own, you will receive a grade of 0 on the entire
assignment or exam in question. This policy applies to cheating and to plagiarism, as
defined in NCCU’s Academic Integrity Statement, found below and at the following
URL: http://www.nccu.edu/academics/liberalarts/history/gradhandbook.cfm
Plagiarism is the unattributed use of another’s work and includes the representation as
your own of material copied from online sources, such as the Wikipedia.
Cutting and pasting material from online resources is not acceptable behavior at any
academic level and will not be tolerated.
Because we use Blackboard, your work is done on your own and the instructor
depends on your honesty and integrity to do all the work assigned alone (unless a
team is designated). You are promising that you did the work without assistance from
another student and without assisting any other student. You can use notes and
textbooks, you can study with others, but you must alone answer questions.
North Carolina Central University is dedicated to instilling in its students the highest
principles of integrity and responsibility. In this regard, students are expected to
demonstrate respect for these principles in the performance of their academic
activities. Academic dishonesty, which is a violation of academic integrity, will be dealt
with according to the provisions of the Student Code of Academic Integrity.
Academic dishonesty is defined as any conduct which is intended by the student to
obtain for him/her or for others an unfair or false evaluation in connection with any
examination or other work for academic credit. Cheating, fabrication, plagiarism, and
complicity are examples of conduct which is academically dishonest.
Cheating is the unauthorized use of materials in connection with an examination or
other work for academic credit, including, but not limited to (1) the use of books, notes,
outlines, etc. during an examination where the instructor has not authorized use of
such materials or information; (2)seeking unauthorized materials or information from
others in connection with an examination; (3) giving or attempting to give unauthorized
assistance to a person in connection with an examination; (4) obtaining or attempting
to obtain unauthorized copies of examinations; (5) bringing to an examination, or
attempting to use during an examination, unauthorized answers which have been
prepared before the examination period; (6) copying or attempting to copy from the
work of another student during an examination; and (7) submitting for evaluation in a
course, part or the whole of a work for which credit has been given previously.
Fabrication is the intentional invention, counterfeiting and/or alteration of quotations,
data, procedures, experiments, sources or other information for which the student
claims authorship in an exercise which he or she submits with the expectation of
receiving academic credit.
Plagiarism is the intentional use of the ideas, words, or work of another without
attribution, when the information they provide is not common knowledge, either in
content or form, and includes, but is not limited to (1) quoting from the published or
unpublished work of another without appropriate attribution; (2) paraphrasing or
summarizing in one’s own work any portion of the published or unpublished materials
of another without attribution; and (3) borrowing from another’s work information which
is not in the domain of common knowledge.
Complicity is the intentional giving of assistance or the attempt to give assistance to
another for the purpose of perpetrating academic dishonesty.
Other Policies:
Student Support Services for Students with Disabilities
Students with disabilities (physical, psychological, learning disability, etc.) who would
like to request accommodations need to register with the Office of Student Support
Services in Suite G20 in the Student Services Building or by contacting Kesha Lee,
Director at (919)530-6325 or klee@nccu.edu. If you are already registered in the
office, you will need to return to the office each semester to review your information
and receive updated accommodations.
Incomplete grades:
The grade of "I" will be given only in unusual cases and must be resolved within a time
frame agreed upon by instructor and student prior to assignation
Late Assignments: Late homework will be penalized at the rate of 5 points (half a letter
grade) per day of lateness.
Late exams will be penalized at the rate of 10 points per day of lateness.
Academic Integrity Policy:
Plagiarism, fabrication and cheating, (including the representation of material copied
from online sources such as Wikipedia.org) are not acceptable academic
behaviors. Such behavior on any assigned class activity will result in the receipt of a
grade of 0 for the entire assignment or exam.
Affirmation:
I have read, understand, and accept the academic integrity policy for this course.
Name (Print):_____________________________
Signature:________________________________
North Carolina Central University
School of Library and Information Science
LSIS 5115-01D: Intellectual Property
Semester: Spring 2009
LOCATION: Tuesdays, 6:00-8:30PM 325 Shepard Library
Instructor: Dr. Peterson
email: gpeterson@nccu.edu
Phone: 919-530-6746
Office hours: By appointment
Course Information
COURSE DESCRIPTION: This course provides a basic understanding of how
copyright, patent and trademark law impact technology and individuals. It
considers legal theory and IT concepts as applied through business system
models to specific patent and copyright issues in workforce situations within
the context of Internet data communications.
STUDENT LEARNING OUTCOMES: Upon completing LSIS 5115, students will
demonstrate understanding of the role of intellectual property issues in
information science and will complete a critical reviews regarding aspects of
the rights of the individual or the academy in the use of intellectual property.
Course Requirements
REQUIRED TEXTS :
Intellectual Property: The Law of Copyrights, Patents and Trademarks by Roger E.
Schechter and John R. Thomas ISBN-10:0314065997
Copyright Law for Librarians And Educators: Creative Strategies And
Practical Solutions by Kenneth CrewsISBN-10: 083890906X
SUPPLEMENTAL TEXTS
Bound By Law? (Tales from the Public Domain) by Aoki,
Boyle, Jenkins Available for free
from:http://www.law.duke.edu/cspd/comics/pdf/cspdcomichigh.pdf
Free Culture: The Nature and Future of Creativity by Lawrence Lessig
Available for free from: http://www.free-culture.cc/freeculture.pdf
Essentials of Intellectual Property by Poltorak ISBN-10: 0471432334
Class points & grading criteria:
Class participation & Online forums - 10%
3 Critical reviews - 10% each
3 Database exercises - 10% each
Midterm exam 15%
Final exam 15%
Course Overview:
MODULE 1: Introduction to Intellectual Property
Definitions of Information technology and intellectual property
The economic & legal issues of Intellectual Property - What it is for, how it
is used
The past, present and future of Intellectual Property and IP law
International issues
MODULE 2: Copyright
Purpose of copyright, who and what copyright law protects
Limits of copyright
Copyright databases
Copyright infringement & remedies
The role of technology in copyright law - Sharing, piracy and backups
Fair use and the rights of the individual
The Creative Commons
The US Code
MODULE 3: Patents
The purpose of patent law, who and what patent law protects
Duration of patents
Obtaining a patent
Patent infringement & remedies
Software patents and the role of technology in patent law
Patent databases
MODULE 4: Trademarks
The purpose of trademark law, who and what trademark law protects
Obtaining a Trademark
Trademark infringement & remedies
The role of technology in trademark law
Trademark databases
Course schedule/calendar:
Week of January 13: Module 1: Introduction to Intellectual Property:
Introduction to IP
Readings: http://www.copyright.iupui.edu/IPPrimer.pdf
Week of January 20:
Module 1, Part 1
Readings: Jolly Ch. 1-3, Schechter & Thomas Ch1
TOPICS: Introduction to IP: History, types of IP, alternatives
Online forum
Week of January 27:
Module 1, Part 2
Jolly Ch 4-8
Week of February 3: Module 2: Copyright
Critical Review #1 (Introduction to IP) Due
Readings: Hornbook: Ch. 2-5
Bound By Law
Online Forum
Week of February 10, 2008:
Readings: Hornbook: Ch. 6-8, Kenneth Crewes
TOPICS: Copyright law, rights, products covered by copyright, duration of
protection, US Code Article 17, WIPO
Weeks of February 17 (Online) & February 24:
Readings: Hornbook Ch. 9 & 10, Kenneth Crewes
TOPICS: Research Paper topic selection, Infringement & the DMCA, First
sale, Fair Use & Other exceptions, Libraries & the ALA, Digital Libraries, the
future of libraries, The RIAA & the MPAA, Lessig, EFF, International Issues
Week of March 3: Copyright & the Internet & the future:
Readings: Lawrence Lessig
TOPICS: Searching copyright Databases, mashups & allowable uses,
copyright in cyberspace.
Assignment: Copyright databases
Week of March 10:
Fall Break – No Class
Week of March 17:
Midterm
Critical review #2 (Copyright) Due
Week of March 24: Module 3: Patents
Readings: Schecter & Thomas Ch 13 -17
TOPICS: Types & requirements, duration & rights, software patents – EFF
Week of March 31:
Readings: Schecter & Thomas Ch 20-23
TOPICS: Rights, registration & patent searching, International Aspects
Assignment: Patent Databases
Online Forum
Week of April 7:
Critical Review #3 (Patents) Due
Weeks of April 14 & 21: Module 4, Trademark, Trade Secret & other
protections
Readings: Hornbook Ch 24-28
TOPICS: Infringement & Defenses, Registration & licensing & the USPTO,
Database searching & Image retrieval
Assignment: Trademark databases
Week of April 28
Class review
Final exam distributed
Week of May 5 – Final Exam Due
POLICIES:
ADA compliance: Please inform the instructor if you have special needs that
need to be accommodated; every effort will be made to accommodate
individuals with special needs
INCOMPLETES: The University has a policy of allowing a student to receive a
grade of Incomplete one time for a given class. If the student wishes, they
may opt to re-take the class at a later time, but they have only one chance
to do so; thus it is imperative that the student finish the course on the
second attempt. This is particularly the case with Core Courses, with which
2 incomplete grades will result in being removed from the program. The
department strongly encourages you to avoid any Incompletes if at all
possible.
LATE HOMEWORK: Late homework will be penalized at the rate of 5 points
(half a letter grade) per day of lateness.
ACADEMIC INTEGRITY: Because we use Blackboard, your work is done on
your own and the instructor depends on your honesty and integrity to do all
the work assigned alone (unless a team is designated). You are promising
that you did the work without assistance from another student and without
assisting any other student. You can use notes and textbooks, you can study
with others, but you must alone answer questions.
Any violations will require a meeting with senior faculty and/or the Dean of
the SLIS. The imposition of the penalty for academic dishonesty shall be
made by the instructor responsible for assigning the final grade in the
course. The penalty will be assessed in relation to the gravity of the offense,
the type of academic exercise on which the offense occurred, and the weight
of that exercise in the computation of the final grade. The following excerpt
from the NC Central University catalogue covers the honor code applied in
this course:
North Carolina Central University is dedicated to instilling in its students the
highest principles of integrity and responsibility. In this regard, students are
expected to demonstrate respect for these principles in the performance of
their academic activities. Academic dishonesty, which is a violation of
academic integrity, will be dealt with according to the provisions of the
Student Code of Academic Integrity.
Academic dishonesty is defined as any conduct which is intended by the
student to obtain for him/her or for others an unfair or false evaluation in
connection with any examination or other work for academic credit.
Cheating, fabrication, plagiarism, and complicity are examples of conduct
which is academically dishonest.
Cheating is the unauthorized use of materials in connection with an
examination or other work for academic credit, including, but not limited to
(1) the use of books, notes, outlines, etc. during an examination where the
instructor has not authorized use of such materials or information;
(2)seeking unauthorized materials or information from others in connection
with an examination; (3) giving or attempting to give unauthorized
assistance to a person in connection with an examination; (4) obtaining or
attempting to obtain unauthorized copies of examinations; (5) bringing to an
examination, or attempting to use during an examination, unauthorized
answers which have been prepared before the examination period; (6)
copying or attempting to copy from the work of another student during an
examination; and (7) submitting for evaluation in a course, part or the whole
of a work for which credit has been given previously.
Fabrication is the intentional invention, counterfeiting and/or alteration of
quotations, data, procedures, experiments, sources or other information for
which the student claims authorship in an exercise which he or she submits
with the expectation of receiving academic credit.
Plagiarism is the intentional use of the ideas, words, or work of
another without attribution, when the information they provide is not
common knowledge, either in content or form, and includes, but is not
limited to (1) quoting from the published or unpublished work of another
without appropriate attribution; (2) paraphrasing or summarizing in one’s
own work any portion of the published or unpublished materials of another
without attribution; and (3) borrowing from another’s work information
which is not in the domain of common knowledge.
Complicity is the intentional giving of assistance or the attempt to give
assistance to another for the purpose of perpetrating academic dishonesty.
For further information please consult: http://nccuslis.org/faq/faqgrades.php#plagiarism