CSC 379/SUM07-2/Assignments: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
(→‎Existing Topics: add of Security Percautions section)
(PAGE MIGRATED - NOW ARCHIVE, see CSC 379:Topics for current page.)
 
(41 intermediate revisions by the same user not shown)
Line 4: Line 4:


'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''
=THIS PAGE HAS BEEN MIGRATED AND IS NOW AN ARCHIVE=
Current Page: [[CSC 379:Topics]]




=New Topics=
=New Topics=
==Internet Radio==
'''speech/internetradio'''
Internet radio stations have been hit with escalating fees from the United States Copyright Royalty Board.  Internet broadcasters are charged per channel and per performance.  One performance is defined as one listener hearing one song.  As fees annually rise this could easily cripple all Internet stations residing in the United States.  A recently proposed bill, the Internet Radio Equality Act, could overturn the Copyright Royalty Board’s fees.  Provide an overview of the issue and the outlook of Internet radio for the future.
For an overview of the history of internet radio, WRAL has a great video interview with a representative from WCPE.  WCPE is the first public radio station in the nation to broadcast its programming on the internet.  [http://www.localtechwire.com/business/local_tech_wire/video/1520412/ WRAL Video ''(10:53)'']


==Net Neutrality==
==Net Neutrality==
'''commerce/anticompetitive/broadband'''
'''commerce/anticompetitive/broadband'''


As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a "tiered Internet" and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.
'''REQUIRES APPROVAL'''
 
Net Neutrality has [http://en.wikipedia.org/wiki/Net_neutrality#Definitions_of_Network_Neutrality multiple definitions], but in general refers to government regulation of internet providers and companies that manage the internet's infrastructure in order to provide more equal treatment of the data transmitted on the network. Provide an overview of the ethical issues raised by policy proposals like Net Neutrality and forms of data discrimination on the internet.


==Internet Radio==
==Social Engineering==
'''speech/internetradio'''
'''(URL not yet determined)'''


Internet radio stations have been hit with escalating fees from the United States Copyright Royalty Board.  Internet broadcasters are charged per channel and per performance.  One performance is defined as one listener hearing one song.  As fees annually rise this could easily cripple all Internet stations residing in the United States.  A recently proposed bill, the Internet Radio Equality Act, could overturn the Copyright Royalty Board’s fees.  Provide an overview of the issue and the outlook of Internet radio for the future.
''See "Security Precautions"''


==Anti-Competitive Databases==
==Use of Anti-Competitive Databases==
'''commerce/anticompetitive/databases'''
'''commerce/anticompetitive/databases'''


If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward content that favors its own business. One of the early examples was Baxter International's database of medical supplies. Other examples include airline databases and web search engines that can list the proprietor's or paid content more prominently than competitors' or even make it hard for consumers to find out what a competitor offers. Improve this page by including more recent content related the anti-competitive databases and the ethical issues they raise.
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward content that favors its own business. One of the early examples was Baxter International's database of medical supplies. Other examples include airline databases and web search engines that can list the proprietor's or paid content more prominently than competitors' or even make it hard for consumers to find out what a competitor offers. Improve this page by including more recent content related the anti-competitive databases and the ethical issues they raise.


=Existing Topics=


=Existing Topics=
==Anonymity==
'''speech/anonymity'''


==Ethical Principles==
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a study guide and a link added from the topic page to it.
'''basics/principles'''


This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse. It should be enhanced substantially. The study guide should be expanded and all existing errors fixed.
''This topic '''should not''' contain content about [http://ethics.csc.ncsu.edu/speech/myspace/ Social Networking]''


{| cellpadding="4"
{| cellpadding="4"
|-
|-
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]
|}
|}


==Fault Tolerance==
==Codes of Ethics==
'''risks/security/fault'''
'''basics/codes'''
 
Deals with codes of ethics and the internet. Could use some more links and the study guide needs better formatting for fluidity.
 
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]
|}


Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.
==Conflicts of Interest==
'''basics/conflicts'''


Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration. Failure of technological systems essential to our lives can have ramifications beyond financialGoogle is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault toleranceCheckout line machines (% downtime unacceptable for supermarkets with early computer systems).
A conflict of interest occurs when someone's personal interest is at odds with his/her job responsibility (e.g., when someone owns stock in a company from which (s)he could make a major software purchase). A lot has been written about conflicts of interest. Including some general articles is fine, but try to have some articles that refer to conflicts of interest in the computer fieldThe current page needs newer linksAlso, most of the links involve the web; it needs more on conflicts of interest that do not involve the web.


{| cellpadding="4"
{| cellpadding="4"
|-
|-
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]
| [http://ethics.csc.ncsu.edu/basics/conflicts/ Current Main Page]
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/basics/conflicts/study.php Current Study Guide]
|}
|}


==Codes of Ethics==
==Cyberstalking==
'''basics/codes'''
'''privacy/cyberstalking'''
 
Cyberstalking refers to the use of the internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type "cyberstalking" to any search engine and pull up a spate of references.
 
Study guide needs to be revised and broken links need to be fixed.


Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.
''This topic should contain content about [http://ethics.csc.ncsu.edu/speech/myspace/ Social Networking] '''only if specifically related to cyberstalking.'''  Do not include any general articles about social networking so to avoid overlap with the existing topic.''


{| cellpadding="4"
{| cellpadding="4"
|-
|-
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]
|}
|}


==Vaporware==
==Digital Millennium Copyright Act==
'''commerce/anticompetitive/vaporware'''
'''intellectual/electronic/dmca'''
 
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.


Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game developmentIt can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.
Address recent uses and ethical controversy surrounding the DMCAInclude discussion of ethical issues raised by DMCA and its enforcement in the study guide.  Update broken links.


{| cellpadding="4"
{| cellpadding="4"
|-
|-
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]
| [http://ethics.csc.ncsu.edu/intellectual/electronic/dmca Current Main Page]
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/intellectual/electronic/dmca/study.php Current Study Guide]
|}
|}


==Ecommerce Security==
==E-Commerce Security==
'''risks/security/ecommerce'''
'''risks/security/ecommerce'''


How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.
How do you secure a site for e-commerce? Security and ethical issues of e-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.


{| cellpadding="4"
{| cellpadding="4"
Line 85: Line 112:
|}
|}


==Anonymity==
==Ethical Principles==
'''speech/anonymity'''
'''basics/principles'''
 
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The study guide should be expanded and all existing errors fixed.
 
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]
|}
 
==Fault Tolerance==
'''risks/security/fault'''


This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.
With society’s increasingly dependent relationship with technology, there are many important ethical considerations regarding how fault tolerant technological systems are.  Failure of systems essential to our lives can have ramifications beyond financial.  Examine responsibility issues in related to outages, methods for improving fault-tolerance, and laws for protecting critical infrastructures.  Recent occurrences.


{| cellpadding="4"
{| cellpadding="4"
|-
|-
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]
|}
|}


Line 99: Line 137:
'''speech/freedom/hate'''
'''speech/freedom/hate'''


This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over "hate speech," with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over "hate speech," with little relationship to the internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the study guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   


All the study guide links need to be fixed.
All the study guide links need to be fixed.
Line 109: Line 147:
|}
|}


==Cyberstalking==
==Instant Messaging==
'''privacy/cyberstalking/'''
'''commerce/anticompetitive/instant'''
 
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type "cyberstalking" to any search engine and pull up a spate of references.


Study guide needs to be revised and broken links need to be fixed.
Most of the references on this page are three or four years old. The issue is whether one company should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.


{| cellpadding="4"
{| cellpadding="4"
|-
|-
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]
|}
|}


==Internet Downloads==
==Internet Downloads==
'''intellectual/piracy/downloads/'''
'''intellectual/piracy/downloads'''


This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.
This page covers the unauthorized downloading of software from bootleg internet sites.  Expand with more links (updated ones). Also the formatting of the study guide should be improved.


{| cellpadding="4"
{| cellpadding="4"
Line 133: Line 169:
|}
|}


==Instant Messaging==
==Security Precautions==
'''commerce/anticompetitive/instant/'''
'''risks/security/precautions'''
 
What security precautions do web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.


Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.
'''Social Engineering''' should be included as a major section within this topic. If you would like to make a new page focused on social engineering, you may if you choose this topic.


{| cellpadding="4"
{| cellpadding="4"
|-
|-
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]
| [http://ethics.csc.ncsu.edu/risks/security/precautions Current Main Page]
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php Current Study Guide]
|}
|}


==Software Reliability ==
==Software Reliability ==
'''risks/reliability/'''
'''risks/reliability'''


The topic page could use some updated links and both the topic page and the Study Guide page are out of format for the site style guidelines.
The topic page could use some updated links and both the topic page and the study guide's format should be improved.


{| cellpadding="4"
{| cellpadding="4"
Line 155: Line 193:
|}
|}


==Conflicts of Interest==
==Vaporware==
'''basics/conflicts/'''
'''commerce/anticompetitive/vaporware'''


A conflict of interest occurs when someone's personal interest is at odds with his job responsibility, e.g., when someone owns stock in a company from which (s)he could make a major software purchase. A lot has been written about conflicts of interest. Including some general articles is fine, but try to have some articles that refer to conflicts of interest in the computer field.  The current page needs newer links.  Also, most of the links involve the Web; it needs more on conflicts of interest that do not involve the Web.
Vaporware is hardware or software announced long before its delivery. Vaporware is used as a popular tactic, especially in regards to operating systems and game development. It has many ethical implications for the software development industry in what types of software to produce and for consumers in what types of software/hardware to purchase. What are the benefits, disadvantages? The current topic page is very old and could use more recent links.  The study guide should be re-written to incorporate more recent occurrences and to cover the topic more thoroughly.


{| cellpadding="4"
{| cellpadding="4"
|-
|-
| [http://ethics.csc.ncsu.edu/basics/conflicts/ Current Main Page]
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]
| [http://ethics.csc.ncsu.edu/basics/conflicts/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]
|}
 
==Digital Millennium Copyright Act==
'''intellectual/electronic/dmca'''
 
Address recent uses and ethical controversy surrounding the DCMA.  Include discussion of ethical issues raised by DCMA and its enforcement in the study guide.  Update broken links.
 
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/intellectual/electronic/dmca Current Main Page]
| [http://ethics.csc.ncsu.edu/intellectual/electronic/dmca/study.php Current Study Guide]
|}
 
==Security Precautions==
'''risks/security/precautions'''
 
What security precautions do Web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against terrorist threats?
 
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/risks/security/precautions Current Main Page]
| [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php Current Study Guide]
|}
|}

Latest revision as of 20:33, 19 July 2007

Temporary page for construction of research assignment topics for CSC 379, SUM07-2.

This page contains the research assignment topics (pending review).

This is where the description of the research assignment expectations would go, or a brief description and the links to it.


THIS PAGE HAS BEEN MIGRATED AND IS NOW AN ARCHIVE

Current Page: CSC 379:Topics


New Topics

Internet Radio

speech/internetradio

Internet radio stations have been hit with escalating fees from the United States Copyright Royalty Board. Internet broadcasters are charged per channel and per performance. One performance is defined as one listener hearing one song. As fees annually rise this could easily cripple all Internet stations residing in the United States. A recently proposed bill, the Internet Radio Equality Act, could overturn the Copyright Royalty Board’s fees. Provide an overview of the issue and the outlook of Internet radio for the future.

For an overview of the history of internet radio, WRAL has a great video interview with a representative from WCPE. WCPE is the first public radio station in the nation to broadcast its programming on the internet. WRAL Video (10:53)

Net Neutrality

commerce/anticompetitive/broadband

REQUIRES APPROVAL

Net Neutrality has multiple definitions, but in general refers to government regulation of internet providers and companies that manage the internet's infrastructure in order to provide more equal treatment of the data transmitted on the network. Provide an overview of the ethical issues raised by policy proposals like Net Neutrality and forms of data discrimination on the internet.

Social Engineering

(URL not yet determined)

See "Security Precautions"

Use of Anti-Competitive Databases

commerce/anticompetitive/databases

If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward content that favors its own business. One of the early examples was Baxter International's database of medical supplies. Other examples include airline databases and web search engines that can list the proprietor's or paid content more prominently than competitors' or even make it hard for consumers to find out what a competitor offers. Improve this page by including more recent content related the anti-competitive databases and the ethical issues they raise.

Existing Topics

Anonymity

speech/anonymity

This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a study guide and a link added from the topic page to it.

This topic should not contain content about Social Networking

Current Main Page Current Study Guide

Codes of Ethics

basics/codes

Deals with codes of ethics and the internet. Could use some more links and the study guide needs better formatting for fluidity.

Current Main Page Current Study Guide

Conflicts of Interest

basics/conflicts

A conflict of interest occurs when someone's personal interest is at odds with his/her job responsibility (e.g., when someone owns stock in a company from which (s)he could make a major software purchase). A lot has been written about conflicts of interest. Including some general articles is fine, but try to have some articles that refer to conflicts of interest in the computer field. The current page needs newer links. Also, most of the links involve the web; it needs more on conflicts of interest that do not involve the web.

Current Main Page Current Study Guide

Cyberstalking

privacy/cyberstalking

Cyberstalking refers to the use of the internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type "cyberstalking" to any search engine and pull up a spate of references.

Study guide needs to be revised and broken links need to be fixed.

This topic should contain content about Social Networking only if specifically related to cyberstalking. Do not include any general articles about social networking so to avoid overlap with the existing topic.

Current Main Page Current Study Guide

Digital Millennium Copyright Act

intellectual/electronic/dmca

Address recent uses and ethical controversy surrounding the DMCA. Include discussion of ethical issues raised by DMCA and its enforcement in the study guide. Update broken links.

Current Main Page Current Study Guide

E-Commerce Security

risks/security/ecommerce

How do you secure a site for e-commerce? Security and ethical issues of e-commerce such as banking online. Please do not include the issue of fraud, which has its own page. Add a few new links, format to site guidelines and evaluate the study guide. Study guide currently has no working links.

Current Main Page Current Study Guide

Ethical Principles

basics/principles

This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse. It should be enhanced substantially. The study guide should be expanded and all existing errors fixed.

Current Main Page Current Study Guide

Fault Tolerance

risks/security/fault

With society’s increasingly dependent relationship with technology, there are many important ethical considerations regarding how fault tolerant technological systems are. Failure of systems essential to our lives can have ramifications beyond financial. Examine responsibility issues in related to outages, methods for improving fault-tolerance, and laws for protecting critical infrastructures. Recent occurrences.

Current Main Page Current Study Guide

Hate Speech

speech/freedom/hate

This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over "hate speech," with little relationship to the internet. Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the study guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.

All the study guide links need to be fixed.

Current Main Page Current Study Guide

Instant Messaging

commerce/anticompetitive/instant

Most of the references on this page are three or four years old. The issue is whether one company should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.

Current Main Page Current Study Guide

Internet Downloads

intellectual/piracy/downloads

This page covers the unauthorized downloading of software from bootleg internet sites. Expand with more links (updated ones). Also the formatting of the study guide should be improved.

Current Main Page Current Study Guide

Security Precautions

risks/security/precautions

What security precautions do web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.

Social Engineering should be included as a major section within this topic. If you would like to make a new page focused on social engineering, you may if you choose this topic.

Current Main Page Current Study Guide

Software Reliability

risks/reliability

The topic page could use some updated links and both the topic page and the study guide's format should be improved.

Current Main Page Current Study Guide

Vaporware

commerce/anticompetitive/vaporware

Vaporware is hardware or software announced long before its delivery. Vaporware is used as a popular tactic, especially in regards to operating systems and game development. It has many ethical implications for the software development industry in what types of software to produce and for consumers in what types of software/hardware to purchase. What are the benefits, disadvantages? The current topic page is very old and could use more recent links. The study guide should be re-written to incorporate more recent occurrences and to cover the topic more thoroughly.

Current Main Page Current Study Guide