CSC 379: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
m (→Week 4 pages) |
||
(53 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
= Class Resources = | |||
===Formatting Resources=== | |||
[http://meta.wikimedia.org/wiki/Help:Wikitext_examples Formatting Help Guide from MetaWiki] | |||
===ACM Technews Search=== | |||
[http://www.google.com/search?hl=en&q=site%3Atechnews.acm.org Google Site Specific Search] | |||
===IEEE Xplore=== | |||
[http://ieeexplore.ieee.org/search/advsearch.jsp http://ieeexplore.ieee.org/search/advsearch.jsp] | |||
===Google Scholar=== | |||
[http://www.google.com/scholar http://www.google.com/scholar] | |||
===Professional Codes of Ethics=== | |||
[http://www.onlineethics.org/CMS/profpractice/ethcodes/13411.aspx National Academy of Engineering] | |||
===Debate Arguments Pyramid=== | |||
An outline of argument types. | |||
[http://blog.createdebate.com/2008/04/07/writing-strong-arguments/ http://blog.createdebate.com/2008/04/07/writing-strong-arguments/] | |||
===HTML to MediaWiki Converter=== | |||
You may find this tool helpful in converting the content on existing pages of the [http://ethics.csc.ncsu.edu ethics.csc.ncsu.edu website] to MediaWiki markup for your research assignment. | |||
[http://labs.seapine.com/htmltowiki.cgi http://labs.seapine.com/htmltowiki.cgi] | |||
===Work Examples=== | |||
Wiki Assignment: [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379:Week_4%2C_Group_4] [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379:Week_2%2C_Group_1] | |||
Research Assignment: [[CSC 379:Research Assignment Sample]] | |||
===Etc.=== | |||
[[temp001]] | |||
= Research Assignment Topics = | |||
[[CSC_379_SUM2008:Topics | '''Research Topics''']] | |||
= Week 1 pages = | = Week 1 pages = | ||
* [[CSC 379 SUM2008:Week 1, Debate | '''Week 1 Debate Topic''']] | |||
* Netiquette Best Practices: Online Communities ([[CSC 379 SUM2008:Week 1, Group 1]]) | |||
* Political Uses of Spam for Special Interests and Influencing Elections ([[CSC 379 SUM2008:Week 1, Group 2]]) | |||
* Spam ([[CSC 379 SUM2008:Week 1, Group 3]]) | |||
* The Effects of Spam-Countermeasures ([[CSC 379 SUM2008:Week 1, Group 4]]) | |||
= Week 2 pages = | |||
* [[CSC 379 SUM2008:Week 2, Debate | '''Week 2 Debate Topic''']] | |||
* Turn-it-in and MOSS ([[CSC 379 SUM2008:Week 2, Group 1]]) | |||
* Alternative Intellectual Property Models ([[CSC 379 SUM2008:Week 2, Group 2]]) | |||
* Search Engines ([[CSC 379 SUM2008:Week 2, Group 3]]) | |||
* File Sharing Countermeasures ([[CSC 379 SUM2008:Week 2, Group 4]]) | |||
= Week 3 pages = | |||
* [[CSC 379 SUM2008:Week 3, Debate | '''Week 3 Debate Topic''']] | |||
* Markets for Bug Reports ([[CSC 379 SUM2008:Week 3, Group 1]]) | |||
* Costs and Benefits of Malware Countermeasures ([[CSC 379 SUM2008:Week 3, Group 2]]) | |||
* Costs and Benefits Password Regulations ([[CSC 379 SUM2008:Week 3, Group 3]]) | |||
* Bundling Malware ([[CSC 379 SUM2008:Week 3, Group 4]]) | |||
= Week 4 pages = | |||
* [[CSC 379 SUM2008:Week 4, Debate | '''Week 4 Debate Topic''']] | |||
* Privacy Policies ([[CSC 379 SUM2008:Week 4, Group 1]]) | |||
* Open Government ([[CSC 379 SUM2008:Week 4, Group 2]]) | |||
* WAN Internet Filtering ([[CSC 379 SUM2008:Week 4, Group 3]]) | |||
* Hidden Tracking Codes ([[CSC 379 SUM2008:Week 4, Group 4]]) | |||
= Week 5 pages = | |||
* [[CSC 379 SUM2008:Week 5, Debate | '''Week 5 Debate Topic''']] | |||
* | * Avoiding the Need for Whistleblowing ([[CSC 379 SUM2008:Week 5, Group 1]]) | ||
* | * Open Non-Proprietary Technology vs. Closed Proprietary Technology ([[CSC 379 SUM2008:Week 5, Group 2]]) | ||
* | * Cyberstalking ([[CSC 379 SUM2008:Week 5, Group 3]]) | ||
* | * Decision Support Systems ([[CSC 379 SUM2008:Week 5, Group 4]]) | ||
Latest revision as of 20:44, 6 August 2008
Class Resources
Formatting Resources
Formatting Help Guide from MetaWiki
ACM Technews Search
IEEE Xplore
http://ieeexplore.ieee.org/search/advsearch.jsp
Google Scholar
Professional Codes of Ethics
National Academy of Engineering
Debate Arguments Pyramid
An outline of argument types.
http://blog.createdebate.com/2008/04/07/writing-strong-arguments/
HTML to MediaWiki Converter
You may find this tool helpful in converting the content on existing pages of the ethics.csc.ncsu.edu website to MediaWiki markup for your research assignment.
http://labs.seapine.com/htmltowiki.cgi
Work Examples
Research Assignment: CSC 379:Research Assignment Sample
Etc.
Research Assignment Topics
Week 1 pages
- Netiquette Best Practices: Online Communities (CSC 379 SUM2008:Week 1, Group 1)
- Political Uses of Spam for Special Interests and Influencing Elections (CSC 379 SUM2008:Week 1, Group 2)
- Spam (CSC 379 SUM2008:Week 1, Group 3)
- The Effects of Spam-Countermeasures (CSC 379 SUM2008:Week 1, Group 4)
Week 2 pages
- Turn-it-in and MOSS (CSC 379 SUM2008:Week 2, Group 1)
- Alternative Intellectual Property Models (CSC 379 SUM2008:Week 2, Group 2)
- Search Engines (CSC 379 SUM2008:Week 2, Group 3)
- File Sharing Countermeasures (CSC 379 SUM2008:Week 2, Group 4)
Week 3 pages
- Markets for Bug Reports (CSC 379 SUM2008:Week 3, Group 1)
- Costs and Benefits of Malware Countermeasures (CSC 379 SUM2008:Week 3, Group 2)
- Costs and Benefits Password Regulations (CSC 379 SUM2008:Week 3, Group 3)
- Bundling Malware (CSC 379 SUM2008:Week 3, Group 4)
Week 4 pages
- Privacy Policies (CSC 379 SUM2008:Week 4, Group 1)
- Open Government (CSC 379 SUM2008:Week 4, Group 2)
- WAN Internet Filtering (CSC 379 SUM2008:Week 4, Group 3)
- Hidden Tracking Codes (CSC 379 SUM2008:Week 4, Group 4)
Week 5 pages
- Avoiding the Need for Whistleblowing (CSC 379 SUM2008:Week 5, Group 1)
- Open Non-Proprietary Technology vs. Closed Proprietary Technology (CSC 379 SUM2008:Week 5, Group 2)
- Cyberstalking (CSC 379 SUM2008:Week 5, Group 3)
- Decision Support Systems (CSC 379 SUM2008:Week 5, Group 4)