CSC 379 SUM2008:Topics: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
(add of link table to each topic)
Line 36: Line 36:


[http://ethics.csc.ncsu.edu/risks/reliability/voting/receipts/new.html Helpful Links]
[http://ethics.csc.ncsu.edu/risks/reliability/voting/receipts/new.html Helpful Links]


= Existing Topics =
= Existing Topics =
Line 46: Line 48:


Provide a general overview of the ethical considerations related to cyberwarfare.  Examine new methods of cyberwarfare, include recent instances, and ethical considerations.
Provide a general overview of the ethical considerations related to cyberwarfare.  Examine new methods of cyberwarfare, include recent instances, and ethical considerations.
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar Current Main Page]
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar/new.html Helpful Links]
|}


==Intellectual Property Law==
==Intellectual Property Law==
Line 51: Line 60:


Provide a general overview of the ethical considerations related to intellectual property law.  Ensure that trade secrets is included in your coverage.
Provide a general overview of the ethical considerations related to intellectual property law.  Ensure that trade secrets is included in your coverage.
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/intellectual/law Current Main Page]
| [http://ethics.csc.ncsu.edu/intellectual/law/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/intellectual/law/new.html Helpful Links]
|}


==Cyberlicenses / Shrinkwrap Licenses==
==Cyberlicenses / Shrinkwrap Licenses==
Line 56: Line 72:


Provide a general overview of the ethical considerations related to shrinkwrap and cyberlicenses.  Expand on licensing related to ownership of content created through web services, such as Facebook and MySpace.
Provide a general overview of the ethical considerations related to shrinkwrap and cyberlicenses.  Expand on licensing related to ownership of content created through web services, such as Facebook and MySpace.
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses Current Main Page (1)]
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses/study.php Current Study Guide (1)]
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses/new.html Helpful Links (1)]
|-
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses Current Main Page (2)]
| [http://ethics.csc.ncsu.edu/intellectual/licensing/shrinkwrap/study.php Current Study Guide (2)]
| [http://ethics.csc.ncsu.edu/intellectual/licensing/shrinkwrap/new.html Helpful Links (2)]
|}


==Computer Modeling==
==Computer Modeling==
Line 61: Line 88:


Provide a general overview of the ethical considerations related to computer modeling, both from a science/engineering, and social/economic perspective.  On a science/engineering view, computer modeling is often used to illustrate complex information, but has a high potential for providing misleading and dishonest presentations of reality.  Include coverage of the ethical considerations for instances of misleading, dishonest, and controversial uses of modeling.  On a social/economic view, include ethical considerations related to developments in computer modeling in virtual communities, such as Second Life.
Provide a general overview of the ethical considerations related to computer modeling, both from a science/engineering, and social/economic perspective.  On a science/engineering view, computer modeling is often used to illustrate complex information, but has a high potential for providing misleading and dishonest presentations of reality.  Include coverage of the ethical considerations for instances of misleading, dishonest, and controversial uses of modeling.  On a social/economic view, include ethical considerations related to developments in computer modeling in virtual communities, such as Second Life.
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/risks/models Current Main Page]
| [http://ethics.csc.ncsu.edu/risks/models/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/risks/models/new.html Helpful Links]
|}


==Depersonalization==
==Depersonalization==
'''social/technoharm''' (update, add studyguide)
'''social/technoharm''' (update, add studyguide)


General.
''TBD''
 
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/social/technoharm Current Main Page]
| [http://ethics.csc.ncsu.edu/social/technoharm/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/social/technoharm/new.html Helpful Links]
|}


==Privacy of Medical Information==
==Privacy of Medical Information==
Line 71: Line 112:


With emerging patient-centric services such as [https://www.google.com/health Google Health] and more medical providers deciding to digitize and manage the health records of their patents through networked systems, traditional practices undergoing change.  Provide a general overview of the ethical considerations related to digital medical information.
With emerging patient-centric services such as [https://www.google.com/health Google Health] and more medical providers deciding to digitize and manage the health records of their patents through networked systems, traditional practices undergoing change.  Provide a general overview of the ethical considerations related to digital medical information.
{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/privacy/medical Current Main Page]
| [http://ethics.csc.ncsu.edu/privacy/medical/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/privacy/medical/new.html Helpful Links]
|}


==Electronic Voting==
==Electronic Voting==
Line 77: Line 125:
Provide a general overview of the ethical considerations related to electronic voting.
Provide a general overview of the ethical considerations related to electronic voting.


{| cellpadding="4"
|-
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic Current Main Page]
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/study.php Current Study Guide]
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/new.html Helpful Links]
|}





Revision as of 12:30, 25 July 2008

New Topics

For these topics, you will be creating the study guide and bibliography sections, instead of providing an update an existing page. Examine the ethics.csc.ncsu.edu website for examples. Since your pages will be created and maintained in wiki-form, please design your pages with wiki markup (not HTML). Formatting resources are provided on the CSC 379 wiki homepage.


Smart Mobs

social/smartmobs

As cell phones, text messaging, GPS, and other technologies make mobilization of groups easier, people are continually finding new uses. Both physical and virtual actions now frequently take place; protests, flooding email accounts and online polls, to impromptu gatherings. Explore smart/flash mobs, and the ethical considerations they raise. Include information on important instances of smart mobs and the future of smart mobs.

Social Dossiers

social/lifebits

Bits and pieces of information about ourselves can be found everywhere online, and most are unaware of just how much information about them is available. Anyone with sufficient time and/or software can assemble social dossiers from this information. Examine the array of personal information available online, efforts to assemble and utilize this information, and ethical considerations raised.

Helpful Links

Phishing

abuse/spam/phishing

Phishing efforts are growing in variety and sophistication. They pose many privacy and security risks. Examine the practice of phishing, its forms, and the ethical considerations raised.

Helpful Links

Encryption

privacy/encryption

Provide a general overview of the ethical considerations of encryption and its use. Within your coverage, explore specifically if governments should be allowed to impose restrictions on the types of encryption that can be used as well as where and how encryption methods may be used.

Helpful Links

Voting Receipts

risks/reliability/voting/receipts

With nearly all votes counted in the United States by computers, paper trails have been considered important to ensure a separate physical record of votes cast. With the emergence of electronic voting, the receipt of a vote is created by the computers, not manually by the user. Explore the ethical considerations that the issue of voting paper trails raise.

Helpful Links


Existing Topics

For these topics you will be performing an update on an existing topic. Pages for the study guide and bibliography sections are included on the ethics.csc.ncsu.edu website, which you will be transitioning to their new wiki-form. Since your pages will be created and maintained in wiki-form, please design your pages with wiki markup (not HTML). Formatting resources are provided on the CSC 379 wiki homepage.


Cyberwarfare

risks/security/cyberwar

Provide a general overview of the ethical considerations related to cyberwarfare. Examine new methods of cyberwarfare, include recent instances, and ethical considerations.

Current Main Page Current Study Guide Helpful Links

Intellectual Property Law

intellectual/law

Provide a general overview of the ethical considerations related to intellectual property law. Ensure that trade secrets is included in your coverage.

Current Main Page Current Study Guide Helpful Links

Cyberlicenses / Shrinkwrap Licenses

intellectual/licensing/cyberlicenses and intellectual/licensing/shrinkwrap

Provide a general overview of the ethical considerations related to shrinkwrap and cyberlicenses. Expand on licensing related to ownership of content created through web services, such as Facebook and MySpace.

Current Main Page (1) Current Study Guide (1) Helpful Links (1)
Current Main Page (2) Current Study Guide (2) Helpful Links (2)

Computer Modeling

risks/models

Provide a general overview of the ethical considerations related to computer modeling, both from a science/engineering, and social/economic perspective. On a science/engineering view, computer modeling is often used to illustrate complex information, but has a high potential for providing misleading and dishonest presentations of reality. Include coverage of the ethical considerations for instances of misleading, dishonest, and controversial uses of modeling. On a social/economic view, include ethical considerations related to developments in computer modeling in virtual communities, such as Second Life.

Current Main Page Current Study Guide Helpful Links

Depersonalization

social/technoharm (update, add studyguide)

TBD

Current Main Page Current Study Guide Helpful Links

Privacy of Medical Information

privacy/medical

With emerging patient-centric services such as Google Health and more medical providers deciding to digitize and manage the health records of their patents through networked systems, traditional practices undergoing change. Provide a general overview of the ethical considerations related to digital medical information.

Current Main Page Current Study Guide Helpful Links

Electronic Voting

risks/reliability/voting/electronic

Provide a general overview of the ethical considerations related to electronic voting.

Current Main Page Current Study Guide Helpful Links


Instant Messaging

commerce/anticompetitive/instant

Most of the references on this page are three or four years old. The issue is whether a small number of companies should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.

Current Main Page Current Study Guide


Security Precautions

risks/security/precautions

What security precautions do web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.

Social Engineering should be included as a major section within this topic. If you would like to make a new page focused on social engineering, you may if you choose this topic.

Current Main Page Current Study Guide