<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Nebergma</id>
	<title>Expertiza_Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Nebergma"/>
	<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Special:Contributions/Nebergma"/>
	<updated>2026-05-16T08:13:49Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_6&amp;diff=1860</id>
		<title>CSC 379:Week 4, Group 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_6&amp;diff=1860"/>
		<updated>2007-07-22T02:21:05Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept [http://www.hacker.co.il/security/ie/css_import.html exploit] of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script.  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of.  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_3&amp;diff=1859</id>
		<title>CSC 379:Week 4, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_3&amp;diff=1859"/>
		<updated>2007-07-22T02:20:49Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept [http://www.hacker.co.il/security/ie/css_import.html exploit] of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script.  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of.  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_3&amp;diff=1858</id>
		<title>CSC 379:Week 4, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_3&amp;diff=1858"/>
		<updated>2007-07-22T02:19:53Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept [http://www.hacker.co.il/security/ie/css_import.html exploit] of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script.  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of [cite].  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_5&amp;diff=1857</id>
		<title>CSC 379:Week 4, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_5&amp;diff=1857"/>
		<updated>2007-07-21T21:36:57Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  Analyze the ethical implications of employers' use of workplace monitoring.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1856</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1856"/>
		<updated>2007-07-21T21:36:46Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  Analyze the ethical implications of employers' use of workplace monitoring.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4&amp;diff=1855</id>
		<title>CSC 379:Week 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4&amp;diff=1855"/>
		<updated>2007-07-21T21:36:21Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Workplace Monitoring */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page contains a draft of discussion topics for Week 4'''&lt;br /&gt;
&lt;br /&gt;
=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan).  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.  --  Genetic data goes well with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  There is a good resource by Forbes that details a dozen genetic tests that exist today (either commercially or in testing) that can predict increased probability of contracting genetically-related diseases during ones lifetime.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.  --  What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/card/ http://ethics.csc.ncsu.edu/privacy/card/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/medical/ http://ethics.csc.ncsu.edu/privacy/medical/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Mapping / Google Street View=&lt;br /&gt;
Many are concerned about the invasiveness of satellite/aerospace imaging.  Governments have complained of risks related to the availability of images of sensitive military or strategic sites, sometimes requesting obfuscation or blackouts of the compromising images.  With the expansion of mapping technologies to the street level, more people have become concerned about how invasive to their privacy public photography can be.  Explore the ethical implications of mapping technologies.  Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?  Are requests for censorship of public photography ethical?  When?  As mapping imagery increases in coverage and resolution over time, should there be a limit or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?&lt;br /&gt;
==Resources===&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
* [http://www.nytimes.com/2007/06/01/technology/01private.html Google Zooms In Too Close for Some (New York Times)] &lt;br /&gt;
* [http://www.boingboing.net/2007/06/05/google_street_view_a.html Public Opinion on Google Street View (Boing Boing)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Internet Surveillance (e.g. AT&amp;amp;T’s NSA Rooms)=&lt;br /&gt;
During the mid 1990s, one would consider himself/herself lucky to find what one was looking for though an internet search.  As internet usage has grown, better search technologies has emerged displacing many human created directory-based search engines with ones providing a vast array of dynamically-created and helpful results.  Technologies such as Google Alerts allows the tracking of yourself and others content on the internet based on keyword identifiers.  Voluntary technologies such as blogs, online photo albums, and social networking have added a wealth of information available about us online.  --  AT&amp;amp;T has come under scrutiny by members of the public for allegedly constructing “NSA rooms” containing equipment that has the capability to monitor large amounts of internet traffic and are only accessible special US Government-affiliated staff members.  --  Examine a variety of ethical concerns related to tracking of both voluntarily and non-voluntarily provided information on the internet by members of the public, employers, government, and schools.  Cite relevant laws, policies, and/or actions taken that are related to these concerns.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/ http://ethics.csc.ncsu.edu/privacy/web/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/mining/ http://ethics.csc.ncsu.edu/privacy/mining/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/surveillance/ http://ethics.csc.ncsu.edu/privacy/surveillance/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/financial/ http://ethics.csc.ncsu.edu/privacy/financial/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Terms of Service and Privacy Policies with Social Networking=&lt;br /&gt;
Many major social networking sites maintain user-submitted information and through Terms of Service and Privacy Policies state that they can use user-submitted information without permission of the user that provided it.  Maintenance of this information over the long term and exposure to third-parties poses many ethical concerns.  Examine and discuss the policies of some major social networking sites and the existing controversy regarding user privacy.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/speech/myspace/ http://ethics.csc.ncsu.edu/speech/myspace/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script [cite].  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of [cite].  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  Analyze the ethical implications of employers' use of workplace monitoring.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4&amp;diff=1854</id>
		<title>CSC 379:Week 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4&amp;diff=1854"/>
		<updated>2007-07-21T21:35:24Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Workplace Monitoring */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page contains a draft of discussion topics for Week 4'''&lt;br /&gt;
&lt;br /&gt;
=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan).  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.  --  Genetic data goes well with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  There is a good resource by Forbes that details a dozen genetic tests that exist today (either commercially or in testing) that can predict increased probability of contracting genetically-related diseases during ones lifetime.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.  --  What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/card/ http://ethics.csc.ncsu.edu/privacy/card/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/medical/ http://ethics.csc.ncsu.edu/privacy/medical/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Mapping / Google Street View=&lt;br /&gt;
Many are concerned about the invasiveness of satellite/aerospace imaging.  Governments have complained of risks related to the availability of images of sensitive military or strategic sites, sometimes requesting obfuscation or blackouts of the compromising images.  With the expansion of mapping technologies to the street level, more people have become concerned about how invasive to their privacy public photography can be.  Explore the ethical implications of mapping technologies.  Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?  Are requests for censorship of public photography ethical?  When?  As mapping imagery increases in coverage and resolution over time, should there be a limit or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?&lt;br /&gt;
==Resources===&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
* [http://www.nytimes.com/2007/06/01/technology/01private.html Google Zooms In Too Close for Some (New York Times)] &lt;br /&gt;
* [http://www.boingboing.net/2007/06/05/google_street_view_a.html Public Opinion on Google Street View (Boing Boing)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Internet Surveillance (e.g. AT&amp;amp;T’s NSA Rooms)=&lt;br /&gt;
During the mid 1990s, one would consider himself/herself lucky to find what one was looking for though an internet search.  As internet usage has grown, better search technologies has emerged displacing many human created directory-based search engines with ones providing a vast array of dynamically-created and helpful results.  Technologies such as Google Alerts allows the tracking of yourself and others content on the internet based on keyword identifiers.  Voluntary technologies such as blogs, online photo albums, and social networking have added a wealth of information available about us online.  --  AT&amp;amp;T has come under scrutiny by members of the public for allegedly constructing “NSA rooms” containing equipment that has the capability to monitor large amounts of internet traffic and are only accessible special US Government-affiliated staff members.  --  Examine a variety of ethical concerns related to tracking of both voluntarily and non-voluntarily provided information on the internet by members of the public, employers, government, and schools.  Cite relevant laws, policies, and/or actions taken that are related to these concerns.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/ http://ethics.csc.ncsu.edu/privacy/web/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/mining/ http://ethics.csc.ncsu.edu/privacy/mining/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/surveillance/ http://ethics.csc.ncsu.edu/privacy/surveillance/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/financial/ http://ethics.csc.ncsu.edu/privacy/financial/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Terms of Service and Privacy Policies with Social Networking=&lt;br /&gt;
Many major social networking sites maintain user-submitted information and through Terms of Service and Privacy Policies state that they can use user-submitted information without permission of the user that provided it.  Maintenance of this information over the long term and exposure to third-parties poses many ethical concerns.  Examine and discuss the policies of some major social networking sites and the existing controversy regarding user privacy.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/speech/myspace/ http://ethics.csc.ncsu.edu/speech/myspace/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script [cite].  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of [cite].  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  Analyze the ethical implications of employers' use of monitoring tools.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4&amp;diff=1853</id>
		<title>CSC 379:Week 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4&amp;diff=1853"/>
		<updated>2007-07-21T21:27:16Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Workplace Monitoring */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page contains a draft of discussion topics for Week 4'''&lt;br /&gt;
&lt;br /&gt;
=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan).  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.  --  Genetic data goes well with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  There is a good resource by Forbes that details a dozen genetic tests that exist today (either commercially or in testing) that can predict increased probability of contracting genetically-related diseases during ones lifetime.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.  --  What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/card/ http://ethics.csc.ncsu.edu/privacy/card/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/medical/ http://ethics.csc.ncsu.edu/privacy/medical/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Mapping / Google Street View=&lt;br /&gt;
Many are concerned about the invasiveness of satellite/aerospace imaging.  Governments have complained of risks related to the availability of images of sensitive military or strategic sites, sometimes requesting obfuscation or blackouts of the compromising images.  With the expansion of mapping technologies to the street level, more people have become concerned about how invasive to their privacy public photography can be.  Explore the ethical implications of mapping technologies.  Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?  Are requests for censorship of public photography ethical?  When?  As mapping imagery increases in coverage and resolution over time, should there be a limit or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?&lt;br /&gt;
==Resources===&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
* [http://www.nytimes.com/2007/06/01/technology/01private.html Google Zooms In Too Close for Some (New York Times)] &lt;br /&gt;
* [http://www.boingboing.net/2007/06/05/google_street_view_a.html Public Opinion on Google Street View (Boing Boing)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Internet Surveillance (e.g. AT&amp;amp;T’s NSA Rooms)=&lt;br /&gt;
During the mid 1990s, one would consider himself/herself lucky to find what one was looking for though an internet search.  As internet usage has grown, better search technologies has emerged displacing many human created directory-based search engines with ones providing a vast array of dynamically-created and helpful results.  Technologies such as Google Alerts allows the tracking of yourself and others content on the internet based on keyword identifiers.  Voluntary technologies such as blogs, online photo albums, and social networking have added a wealth of information available about us online.  --  AT&amp;amp;T has come under scrutiny by members of the public for allegedly constructing “NSA rooms” containing equipment that has the capability to monitor large amounts of internet traffic and are only accessible special US Government-affiliated staff members.  --  Examine a variety of ethical concerns related to tracking of both voluntarily and non-voluntarily provided information on the internet by members of the public, employers, government, and schools.  Cite relevant laws, policies, and/or actions taken that are related to these concerns.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/ http://ethics.csc.ncsu.edu/privacy/web/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/mining/ http://ethics.csc.ncsu.edu/privacy/mining/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/surveillance/ http://ethics.csc.ncsu.edu/privacy/surveillance/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/financial/ http://ethics.csc.ncsu.edu/privacy/financial/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Terms of Service and Privacy Policies with Social Networking=&lt;br /&gt;
Many major social networking sites maintain user-submitted information and through Terms of Service and Privacy Policies state that they can use user-submitted information without permission of the user that provided it.  Maintenance of this information over the long term and exposure to third-parties poses many ethical concerns.  Examine and discuss the policies of some major social networking sites and the existing controversy regarding user privacy.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/speech/myspace/ http://ethics.csc.ncsu.edu/speech/myspace/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script [cite].  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of [cite].  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace pose many ethical concerns.  Existing technologies can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  Analyze the ethical implications of employers that make use of monitoring tools.  &lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4&amp;diff=1852</id>
		<title>CSC 379:Week 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4&amp;diff=1852"/>
		<updated>2007-07-21T21:25:51Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Workplace Monitoring */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page contains a draft of discussion topics for Week 4'''&lt;br /&gt;
&lt;br /&gt;
=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan).  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.  --  Genetic data goes well with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  There is a good resource by Forbes that details a dozen genetic tests that exist today (either commercially or in testing) that can predict increased probability of contracting genetically-related diseases during ones lifetime.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.  --  What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/card/ http://ethics.csc.ncsu.edu/privacy/card/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/medical/ http://ethics.csc.ncsu.edu/privacy/medical/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Mapping / Google Street View=&lt;br /&gt;
Many are concerned about the invasiveness of satellite/aerospace imaging.  Governments have complained of risks related to the availability of images of sensitive military or strategic sites, sometimes requesting obfuscation or blackouts of the compromising images.  With the expansion of mapping technologies to the street level, more people have become concerned about how invasive to their privacy public photography can be.  Explore the ethical implications of mapping technologies.  Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?  Are requests for censorship of public photography ethical?  When?  As mapping imagery increases in coverage and resolution over time, should there be a limit or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?&lt;br /&gt;
==Resources===&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
* [http://www.nytimes.com/2007/06/01/technology/01private.html Google Zooms In Too Close for Some (New York Times)] &lt;br /&gt;
* [http://www.boingboing.net/2007/06/05/google_street_view_a.html Public Opinion on Google Street View (Boing Boing)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Internet Surveillance (e.g. AT&amp;amp;T’s NSA Rooms)=&lt;br /&gt;
During the mid 1990s, one would consider himself/herself lucky to find what one was looking for though an internet search.  As internet usage has grown, better search technologies has emerged displacing many human created directory-based search engines with ones providing a vast array of dynamically-created and helpful results.  Technologies such as Google Alerts allows the tracking of yourself and others content on the internet based on keyword identifiers.  Voluntary technologies such as blogs, online photo albums, and social networking have added a wealth of information available about us online.  --  AT&amp;amp;T has come under scrutiny by members of the public for allegedly constructing “NSA rooms” containing equipment that has the capability to monitor large amounts of internet traffic and are only accessible special US Government-affiliated staff members.  --  Examine a variety of ethical concerns related to tracking of both voluntarily and non-voluntarily provided information on the internet by members of the public, employers, government, and schools.  Cite relevant laws, policies, and/or actions taken that are related to these concerns.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/ http://ethics.csc.ncsu.edu/privacy/web/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/mining/ http://ethics.csc.ncsu.edu/privacy/mining/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/surveillance/ http://ethics.csc.ncsu.edu/privacy/surveillance/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/financial/ http://ethics.csc.ncsu.edu/privacy/financial/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Terms of Service and Privacy Policies with Social Networking=&lt;br /&gt;
Many major social networking sites maintain user-submitted information and through Terms of Service and Privacy Policies state that they can use user-submitted information without permission of the user that provided it.  Maintenance of this information over the long term and exposure to third-parties poses many ethical concerns.  Examine and discuss the policies of some major social networking sites and the existing controversy regarding user privacy.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/speech/myspace/ http://ethics.csc.ncsu.edu/speech/myspace/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script [cite].  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of [cite].  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace pose many ethical concerns.  Existing technologies can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while spying on employees is used against them.  Analyze the implications of employers that make use of monitoring tools.  &lt;br /&gt;
&lt;br /&gt;
[to be continued...]&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_6&amp;diff=1851</id>
		<title>CSC 379:Week 4, Group 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_6&amp;diff=1851"/>
		<updated>2007-07-21T21:13:55Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script [cite].  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of [cite].  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_3&amp;diff=1850</id>
		<title>CSC 379:Week 4, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_3&amp;diff=1850"/>
		<updated>2007-07-21T21:13:33Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet=&lt;br /&gt;
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script [cite].  Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of [cite].  This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted.  Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory.  However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation).  In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.  With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information.  --  Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs.  Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.  Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. &lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1849</id>
		<title>CSC 379:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1849"/>
		<updated>2007-07-21T21:11:07Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Internet Surveillance (e.g. AT&amp;amp;T’s NSA Rooms)=&lt;br /&gt;
During the mid 1990s, one would consider himself/herself lucky to find what one was looking for though an internet search.  As internet usage has grown, better search technologies has emerged displacing many human created directory-based search engines with ones providing a vast array of dynamically-created and helpful results.  Technologies such as Google Alerts allows the tracking of yourself and others content on the internet based on keyword identifiers.  Voluntary technologies such as blogs, online photo albums, and social networking have added a wealth of information available about us online.  --  AT&amp;amp;T has come under scrutiny by members of the public for allegedly constructing “NSA rooms” containing equipment that has the capability to monitor large amounts of internet traffic and are only accessible special US Government-affiliated staff members.  --  Examine a variety of ethical concerns related to tracking of both voluntarily and non-voluntarily provided information on the internet by members of the public, employers, government, and schools.  Cite relevant laws, policies, and/or actions taken that are related to these concerns.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/ http://ethics.csc.ncsu.edu/privacy/web/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/mining/ http://ethics.csc.ncsu.edu/privacy/mining/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/surveillance/ http://ethics.csc.ncsu.edu/privacy/surveillance/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/financial/ http://ethics.csc.ncsu.edu/privacy/financial/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_1&amp;diff=1848</id>
		<title>CSC 379:Week 4, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_1&amp;diff=1848"/>
		<updated>2007-07-21T21:10:54Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Internet Surveillance (e.g. AT&amp;amp;T’s NSA Rooms)=&lt;br /&gt;
During the mid 1990s, one would consider himself/herself lucky to find what one was looking for though an internet search.  As internet usage has grown, better search technologies has emerged displacing many human created directory-based search engines with ones providing a vast array of dynamically-created and helpful results.  Technologies such as Google Alerts allows the tracking of yourself and others content on the internet based on keyword identifiers.  Voluntary technologies such as blogs, online photo albums, and social networking have added a wealth of information available about us online.  --  AT&amp;amp;T has come under scrutiny by members of the public for allegedly constructing “NSA rooms” containing equipment that has the capability to monitor large amounts of internet traffic and are only accessible special US Government-affiliated staff members.  --  Examine a variety of ethical concerns related to tracking of both voluntarily and non-voluntarily provided information on the internet by members of the public, employers, government, and schools.  Cite relevant laws, policies, and/or actions taken that are related to these concerns.&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/ http://ethics.csc.ncsu.edu/privacy/web/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/mining/ http://ethics.csc.ncsu.edu/privacy/mining/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/surveillance/ http://ethics.csc.ncsu.edu/privacy/surveillance/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/financial/ http://ethics.csc.ncsu.edu/privacy/financial/]&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379&amp;diff=1847</id>
		<title>CSC 379</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379&amp;diff=1847"/>
		<updated>2007-07-21T21:09:33Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Week 4 pages */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Formatting Resources===&lt;br /&gt;
[http://meta.wikimedia.org/wiki/Help:Wikitext_examples Formatting Help Guide from MetaWiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Assignment Topics =&lt;br /&gt;
[[CSC 379:Topics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Week 1 pages =&lt;br /&gt;
&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 1]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Weed 1, Group 2|CSC 379:Week 1, Group 2]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 3]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 4]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 5]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 6]])&lt;br /&gt;
&lt;br /&gt;
= Week 2 pages =&lt;br /&gt;
&lt;br /&gt;
* Creative Commons ([[CSC 379:Week 2, Group 1]])&lt;br /&gt;
* GNU General Public License ([[CSC 379:Week 2, Group 2]])&lt;br /&gt;
* Software Patents ([[CSC 379:Week 2, Group 3]])&lt;br /&gt;
* Creative Commons ([[CSC 379:Week 2, Group 4]])&lt;br /&gt;
* GNU General Public License ([[CSC 379:Week 2, Group 5]])&lt;br /&gt;
* Software Patents ([[CSC 379:Week 2, Group 6]])&lt;br /&gt;
&lt;br /&gt;
= Week 4 pages =&lt;br /&gt;
&lt;br /&gt;
* Internet Surveillance ([[CSC 379:Week 4, Group 1]])&lt;br /&gt;
* Workplace Monitoring ([[CSC 379:Week 4, Group 2]])&lt;br /&gt;
* Privacy of Search Content / Search Engines ([[CSC 379:Week 4, Group 3]])&lt;br /&gt;
* Internet Surveillance ([[CSC 379:Week 4, Group 4]])&lt;br /&gt;
* Workplace Monitoring ([[CSC 379:Week 4, Group 5]])&lt;br /&gt;
* Privacy of Search Content / Search Engines ([[CSC 379:Week 4, Group 6]])&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379&amp;diff=1846</id>
		<title>CSC 379</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379&amp;diff=1846"/>
		<updated>2007-07-21T21:09:06Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Formatting Resources===&lt;br /&gt;
[http://meta.wikimedia.org/wiki/Help:Wikitext_examples Formatting Help Guide from MetaWiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Assignment Topics =&lt;br /&gt;
[[CSC 379:Topics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Week 1 pages =&lt;br /&gt;
&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 1]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Weed 1, Group 2|CSC 379:Week 1, Group 2]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 3]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 4]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 5]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 6]])&lt;br /&gt;
&lt;br /&gt;
= Week 2 pages =&lt;br /&gt;
&lt;br /&gt;
* Creative Commons ([[CSC 379:Week 2, Group 1]])&lt;br /&gt;
* GNU General Public License ([[CSC 379:Week 2, Group 2]])&lt;br /&gt;
* Software Patents ([[CSC 379:Week 2, Group 3]])&lt;br /&gt;
* Creative Commons ([[CSC 379:Week 2, Group 4]])&lt;br /&gt;
* GNU General Public License ([[CSC 379:Week 2, Group 5]])&lt;br /&gt;
* Software Patents ([[CSC 379:Week 2, Group 6]])&lt;br /&gt;
&lt;br /&gt;
= Week 4 pages =&lt;br /&gt;
&lt;br /&gt;
* Internet Surveillance ([[CSC 379:Week 2, Group 1]])&lt;br /&gt;
* Workplace Monitoring ([[CSC 379:Week 2, Group 2]])&lt;br /&gt;
* Privacy of Search Content / Search Engines ([[CSC 379:Week 2, Group 3]])&lt;br /&gt;
* Internet Surveillance ([[CSC 379:Week 2, Group 4]])&lt;br /&gt;
* Workplace Monitoring ([[CSC 379:Week 2, Group 5]])&lt;br /&gt;
* Privacy of Search Content / Search Engines ([[CSC 379:Week 2, Group 6]])&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=User:Nebergma&amp;diff=1778</id>
		<title>User:Nebergma</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=User:Nebergma&amp;diff=1778"/>
		<updated>2007-07-19T16:48:24Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;People usually call me Neil Bergman.  I am one of the TAs for CSC 379 in the Summer 2007 session.  Send me any email if you have any problems or concerns relating to class.&lt;br /&gt;
&lt;br /&gt;
Email: nebergma@ncsu.edu&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=User:Nebergma&amp;diff=1775</id>
		<title>User:Nebergma</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=User:Nebergma&amp;diff=1775"/>
		<updated>2007-07-19T16:47:44Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;People usually call me Neil Bergman.  I am one of the TAs for CSC 379 in the Summer 2007 session.&lt;br /&gt;
&lt;br /&gt;
Email: nebergma@ncsu.edu&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1750</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1750"/>
		<updated>2007-07-19T03:22:55Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Internet Radio */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Internet Radio==&lt;br /&gt;
'''speech/internetradio'''&lt;br /&gt;
&lt;br /&gt;
Internet radio stations have been hit with escalating fees from the United States Copyright Royalty Board.  Internet broadcasters are charged per channel and per performance.  One performance is defined as one listener hearing one song.  As fees annually rise this could easily cripple all Internet stations residing in the United States.  A recently proposed bill, the Internet Radio Equality Act, could overturn the Copyright Royalty Board’s fees.  Provide an overview of the issue and the outlook of Internet radio for the future.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant/'''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Software Reliability ==&lt;br /&gt;
'''risks/reliability/'''&lt;br /&gt;
&lt;br /&gt;
The topic page could use some updated links and both the topic page and the Study Guide page are out of format for the site style guidelines.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conflicts of Interest==&lt;br /&gt;
'''basics/conflicts/'''&lt;br /&gt;
&lt;br /&gt;
A conflict of interest occurs when someone's personal interest is at odds with his job responsibility, e.g., when someone owns stock in a company from which (s)he could make a major software purchase. A lot has been written about conflicts of interest. Including some general articles is fine, but try to have some articles that refer to conflicts of interest in the computer field.  The current page needs newer links.  Also, most of the links involve the Web; it needs more on conflicts of interest that do not involve the Web.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/conflicts/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/conflicts/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1749</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1749"/>
		<updated>2007-07-19T03:22:28Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Internet Radio */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Internet Radio==&lt;br /&gt;
'''speech/internetradio'''&lt;br /&gt;
&lt;br /&gt;
Internet radio stations have been hit with escalating fees from the United States Copyright Royalty Board.  Internet broadcasters are charged per channel and per performance.  One performance is defined as one listener hearing one song.  As fees annually rise this could easily cripple all Internet stations residing in the United States.  A recently proposed bill, Internet Radio Equality Act, could overturn the Copyright Royalty Board’s fees.  Provide an overview of the issue and the outlook of Internet radio for the future.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant/'''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Software Reliability ==&lt;br /&gt;
'''risks/reliability/'''&lt;br /&gt;
&lt;br /&gt;
The topic page could use some updated links and both the topic page and the Study Guide page are out of format for the site style guidelines.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conflicts of Interest==&lt;br /&gt;
'''basics/conflicts/'''&lt;br /&gt;
&lt;br /&gt;
A conflict of interest occurs when someone's personal interest is at odds with his job responsibility, e.g., when someone owns stock in a company from which (s)he could make a major software purchase. A lot has been written about conflicts of interest. Including some general articles is fine, but try to have some articles that refer to conflicts of interest in the computer field.  The current page needs newer links.  Also, most of the links involve the Web; it needs more on conflicts of interest that do not involve the Web.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/conflicts/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/conflicts/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1748</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1748"/>
		<updated>2007-07-19T03:21:57Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* New Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Internet Radio==&lt;br /&gt;
'''speech/internetradio'''&lt;br /&gt;
&lt;br /&gt;
Internet radio has been hit with escalating fees from the United States Copyright Royalty Board.  Internet broadcasters are charged per channel and per performance.  One performance is defined as one listener hearing one song.  As fees annually rise this could easily cripple all Internet stations residing in the United States.  A recently proposed bill, Internet Radio Equality Act, could overturn the Copyright Royalty Board’s fees.  Provide an overview of the issue and the outlook of Internet radio for the future.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant/'''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Software Reliability ==&lt;br /&gt;
'''risks/reliability/'''&lt;br /&gt;
&lt;br /&gt;
The topic page could use some updated links and both the topic page and the Study Guide page are out of format for the site style guidelines.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conflicts of Interest==&lt;br /&gt;
'''basics/conflicts/'''&lt;br /&gt;
&lt;br /&gt;
A conflict of interest occurs when someone's personal interest is at odds with his job responsibility, e.g., when someone owns stock in a company from which (s)he could make a major software purchase. A lot has been written about conflicts of interest. Including some general articles is fine, but try to have some articles that refer to conflicts of interest in the computer field.  The current page needs newer links.  Also, most of the links involve the Web; it needs more on conflicts of interest that do not involve the Web.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/conflicts/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/conflicts/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1745</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1745"/>
		<updated>2007-07-18T02:41:01Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant/'''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Software Reliability ==&lt;br /&gt;
'''risks/reliability/'''&lt;br /&gt;
&lt;br /&gt;
The topic page could use some updated links and both the topic page and the Study Guide page are out of format for the site style guidelines.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conflicts of Interest==&lt;br /&gt;
'''basics/conflicts/'''&lt;br /&gt;
&lt;br /&gt;
A conflict of interest occurs when someone's personal interest is at odds with his job responsibility, e.g., when someone owns stock in a company from which (s)he could make a major software purchase. A lot has been written about conflicts of interest. Including some general articles is fine, but try to have some articles that refer to conflicts of interest in the computer field.  The current page needs newer links.  Also, most of the links involve the Web; it needs more on conflicts of interest that do not involve the Web.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/conflicts/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/conflicts/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1744</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1744"/>
		<updated>2007-07-18T02:36:55Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Instant Messaging */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant/'''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Software Reliability ==&lt;br /&gt;
'''risks/reliability/'''&lt;br /&gt;
&lt;br /&gt;
The topic page could use some updated links and both the topic page and the Study Guide page are out of format for the site style guidelines.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1743</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1743"/>
		<updated>2007-07-18T02:36:44Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Software Reliability */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant/''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Software Reliability ==&lt;br /&gt;
'''risks/reliability/'''&lt;br /&gt;
&lt;br /&gt;
The topic page could use some updated links and both the topic page and the Study Guide page are out of format for the site style guidelines.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1742</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1742"/>
		<updated>2007-07-18T02:36:09Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant/''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Software Reliability ==&lt;br /&gt;
'''risks/reliability/''&lt;br /&gt;
&lt;br /&gt;
The topic page could use some updated links and both the topic page and the Study Guide page are out of format for the site style guidelines.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1741</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1741"/>
		<updated>2007-07-18T02:27:34Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant/''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether one company can unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1740</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1740"/>
		<updated>2007-07-18T02:19:10Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Internet Downloads==&lt;br /&gt;
'''intellectual/piracy/downloads/'''&lt;br /&gt;
&lt;br /&gt;
This page covers the unauthorized downloading of software from bootleg Internet sites.  Just need to expand with more links (updated ones). Also the formatting of the Study Guide is off and needs to be adjusted.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/piracy/downloads/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1739</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1739"/>
		<updated>2007-07-17T22:44:38Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Cyberstalking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/cyberstalking/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1738</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1738"/>
		<updated>2007-07-17T22:44:04Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberstalking==&lt;br /&gt;
'''privacy/cyberstalking/'''&lt;br /&gt;
&lt;br /&gt;
Cyberstalking refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. It's time for an update and expansion of this page. Type &amp;quot;cyberstalking&amp;quot; to any search engine and pull up a spate of references.&lt;br /&gt;
&lt;br /&gt;
Study guide needs to be revised and broken links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1737</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1737"/>
		<updated>2007-07-17T22:35:48Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Hate Speech */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
(Temp) This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1736</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1736"/>
		<updated>2007-07-17T22:35:30Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Hate Speech==&lt;br /&gt;
'''speech/freedom/hate'''&lt;br /&gt;
&lt;br /&gt;
(Temp: Revise) This page is supposed to focus on the danger of hate groups using the Internet to promulgate their message and recruit members. Unfortunately the current focus is on the controversy over &amp;quot;hate speech,&amp;quot; with little relationship to the Internet.  Please fix it so it is appropriate for an Ethics in Computing site. Try to expand the Study Guide. Also, the formatting on the topic page has gone a little wide and should be brought back in.   &lt;br /&gt;
&lt;br /&gt;
All the study guide links need to be fixed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/freedom/hate/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1735</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1735"/>
		<updated>2007-07-17T22:29:15Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Ecommerce Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.  Study guide currently has no working links.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1734</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1734"/>
		<updated>2007-07-17T22:28:28Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Anonymity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1733</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1733"/>
		<updated>2007-07-17T22:28:01Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
'''speech/anonymity'''&lt;br /&gt;
&lt;br /&gt;
This page has to do with anonymous remailers, individual user privacies, etc. It could use some updated links, but mainly needs a Study Guide and link to it.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity' Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/speech/anonymity'study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1732</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1732"/>
		<updated>2007-07-17T22:20:22Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
'''risks/security/ecommerce'''&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1731</id>
		<title>CSC 379/SUM07-2/Assignments</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379/SUM07-2/Assignments&amp;diff=1731"/>
		<updated>2007-07-17T22:19:33Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: /* Existing Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Temporary page for construction of research assignment topics for CSC 379, SUM07-2.&lt;br /&gt;
&lt;br /&gt;
This page contains the research assignment topics (pending review).&lt;br /&gt;
&lt;br /&gt;
'''This is where the description of the research assignment expectations would go, or a brief description and the links to it.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=New Topics=&lt;br /&gt;
&lt;br /&gt;
==Net Neutrality==&lt;br /&gt;
'''commerce/anticompetitive/broadband'''&lt;br /&gt;
&lt;br /&gt;
As things are right now, all traffic on the Internet is treated the same. However, more recently, telecom companies and ISP's have been trying to push legislation through congress that would allow them to create a &amp;quot;tiered Internet&amp;quot; and charge more for certain content (e.g., every time a user does a Google search in a neighborhood serviced by TimeWarner, Google would be charged). Provide an overview of the issue, the opposing views, and the consequences it could bring if implemented.&lt;br /&gt;
&lt;br /&gt;
==Anti-Competitive Databases==&lt;br /&gt;
'''commerce/anticompetitive/databases'''&lt;br /&gt;
&lt;br /&gt;
If a corporation provides a product or service, and also controls one of the major on-line databases that direct customers to suppliers of that product or service, a conflict of interest arises that tempts the corporation to use the database to steer customers unfairly toward its own business. One of the early examples was Baxter International's database of medical supplies. Nowadays, most of the press is garnered by airline databases that can list the proprietor's flights more prominently than competitors', or even make it hard for consumers to find out what a competitor offers. Recently, independent travel agents and travel Websites have become concerned that the major airlines are going to band together to &amp;quot;steal&amp;quot; business through their own Orbitz travel Website.  Note:  This topic is not about database privacy.  No credit will be given for a page that deals with privacy issues.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): More currently, how search engines store and present information from their databases have become important.  Advertisers often desire the best placement of their search results, but how paid advertisements are presented raises many ethical issues.  Some search engines do not distinguish paid advertisements from legitimate search results.  What happens when the business with the deepest pockets has the ability to drown out the results of arguably egalitarian algorithms?  (Google News has come under scrutiny for the disassociation of news from advertising contained on host websites.  Google Print and Google News incorporates copyrighted material into the search results, surrounded by their advertising.)-related?&lt;br /&gt;
&lt;br /&gt;
=Existing Topics=&lt;br /&gt;
&lt;br /&gt;
==Ethical Principles==&lt;br /&gt;
'''basics/principles'''&lt;br /&gt;
&lt;br /&gt;
This page is about ethical principles, and should draw heavily from philosophy-related sites. The topic page is in good shape, though rather sparse.  It should be enhanced substantially. The Study Guide falls out of format toward the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/principles/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Fault Tolerance==&lt;br /&gt;
'''risks/security/fault'''&lt;br /&gt;
&lt;br /&gt;
Responsibility issues in case of outages. Methods for improving fault-tolerance. Laws for protecting critical infrastructures. Recent occurrences.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): With society’s increasingly dependent relationship with technology, how fault tolerant systems are is an important ethical consideration.  Failure of technological systems essential to our lives can have ramifications beyond financial.  Google is approaching this issue by using cheap hardware with highly redundant design of systems to increase fault tolerance.  Checkout line machines (% downtime unacceptable for supermarkets with early computer systems).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/fault/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Codes of Ethics==&lt;br /&gt;
'''basics/codes'''&lt;br /&gt;
&lt;br /&gt;
Deals with codes of ethics and the Internet. Could use some more links and the Study Guide needs better formatting for fluidity.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/basics/codes/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Vaporware==&lt;br /&gt;
'''commerce/anticompetitive/vaporware'''&lt;br /&gt;
&lt;br /&gt;
What is vaporware? Software announced long before its delivery. What are the benefits, disadvantages? The site could use more up to date links (a couple are broken) and more. Need a new introduction with new links that are not misleading.&lt;br /&gt;
&lt;br /&gt;
Temp (to be revised): Vaporware is a popular tactic, especially with operating systems and game development.  It can make or break a game system and has many ethical implications for consumers in what types of software and hardware to purchase.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/vaporware/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Ecommerce Security==&lt;br /&gt;
&amp;quot;&amp;quot;risks/security/ecommerce&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
How do you secure a site for e-commerce? Security and ethical issues of E-commerce such as banking online. Please do not include the issue of fraud, which has its [http://ethics.csc.ncsu.edu/commerce/fraud/ own page].  Add a few new links, format to site guidelines and evaluate the study guide.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/ecommerce/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379&amp;diff=1585</id>
		<title>CSC 379</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379&amp;diff=1585"/>
		<updated>2007-07-12T23:01:57Z</updated>

		<summary type="html">&lt;p&gt;Nebergma: add of formatting resources section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Formatting Resources===&lt;br /&gt;
[http://meta.wikimedia.org/wiki/Help:Wikitext_examples Formatting Help Guide from MetaWiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Week 1 pages =&lt;br /&gt;
&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 1]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Weed 1, Group 2|CSC 379:Week 1, Group 2]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 3]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 4]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 5]])&lt;br /&gt;
* The ethics of defenses against spam ([[CSC 379:Week 1, Group 6]])&lt;br /&gt;
&lt;br /&gt;
= Week 2 pages =&lt;br /&gt;
&lt;br /&gt;
* Creative Commons ([[CSC 379:Week 2, Group 1]])&lt;br /&gt;
* GNU General Public License ([[CSC 379:Week 2, Group 2]])&lt;br /&gt;
* Software Patents ([[CSC 379:Week 2, Group 3]])&lt;br /&gt;
* Creative Commons ([[CSC 379:Week 2, Group 4]])&lt;br /&gt;
* GNU General Public License ([[CSC 379:Week 2, Group 5]])&lt;br /&gt;
* Software Patents ([[CSC 379:Week 2, Group 6]])&lt;/div&gt;</summary>
		<author><name>Nebergma</name></author>
	</entry>
</feed>