CSC 379: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
m (→Week 4 pages) |
||
(4 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
= Class Resources = | |||
===Formatting Resources=== | ===Formatting Resources=== | ||
[http://meta.wikimedia.org/wiki/Help:Wikitext_examples Formatting Help Guide from MetaWiki] | [http://meta.wikimedia.org/wiki/Help:Wikitext_examples Formatting Help Guide from MetaWiki] | ||
Line 17: | Line 18: | ||
[http://labs.seapine.com/htmltowiki.cgi http://labs.seapine.com/htmltowiki.cgi] | [http://labs.seapine.com/htmltowiki.cgi http://labs.seapine.com/htmltowiki.cgi] | ||
===Work Examples=== | ===Work Examples=== | ||
Line 24: | Line 23: | ||
Research Assignment: [[CSC 379:Research Assignment Sample]] | Research Assignment: [[CSC 379:Research Assignment Sample]] | ||
===Etc.=== | |||
[[temp001]] | |||
= Research Assignment Topics = | = Research Assignment Topics = | ||
[[CSC_379_SUM2008:Topics | '''Research Topics''']] | [[CSC_379_SUM2008:Topics | '''Research Topics''']] | ||
= Week 1 pages = | = Week 1 pages = | ||
Line 35: | Line 40: | ||
* Spam ([[CSC 379 SUM2008:Week 1, Group 3]]) | * Spam ([[CSC 379 SUM2008:Week 1, Group 3]]) | ||
* The Effects of Spam-Countermeasures ([[CSC 379 SUM2008:Week 1, Group 4]]) | * The Effects of Spam-Countermeasures ([[CSC 379 SUM2008:Week 1, Group 4]]) | ||
= Week 2 pages = | = Week 2 pages = | ||
Line 43: | Line 49: | ||
* Search Engines ([[CSC 379 SUM2008:Week 2, Group 3]]) | * Search Engines ([[CSC 379 SUM2008:Week 2, Group 3]]) | ||
* File Sharing Countermeasures ([[CSC 379 SUM2008:Week 2, Group 4]]) | * File Sharing Countermeasures ([[CSC 379 SUM2008:Week 2, Group 4]]) | ||
= Week 3 pages = | = Week 3 pages = | ||
Line 51: | Line 58: | ||
* Costs and Benefits Password Regulations ([[CSC 379 SUM2008:Week 3, Group 3]]) | * Costs and Benefits Password Regulations ([[CSC 379 SUM2008:Week 3, Group 3]]) | ||
* Bundling Malware ([[CSC 379 SUM2008:Week 3, Group 4]]) | * Bundling Malware ([[CSC 379 SUM2008:Week 3, Group 4]]) | ||
= Week 4 pages = | = Week 4 pages = | ||
''' | * [[CSC 379 SUM2008:Week 4, Debate | '''Week 4 Debate Topic''']] | ||
* Privacy Policies ([[CSC 379 SUM2008:Week 4, Group 1]]) | |||
* Open Government ([[CSC 379 SUM2008:Week 4, Group 2]]) | |||
* WAN Internet Filtering ([[CSC 379 SUM2008:Week 4, Group 3]]) | |||
* Hidden Tracking Codes ([[CSC 379 SUM2008:Week 4, Group 4]]) | |||
= Week 5 pages = | = Week 5 pages = | ||
''' | * [[CSC 379 SUM2008:Week 5, Debate | '''Week 5 Debate Topic''']] | ||
* Avoiding the Need for Whistleblowing ([[CSC 379 SUM2008:Week 5, Group 1]]) | |||
* Open Non-Proprietary Technology vs. Closed Proprietary Technology ([[CSC 379 SUM2008:Week 5, Group 2]]) | |||
* Cyberstalking ([[CSC 379 SUM2008:Week 5, Group 3]]) | |||
* Decision Support Systems ([[CSC 379 SUM2008:Week 5, Group 4]]) |
Latest revision as of 20:44, 6 August 2008
Class Resources
Formatting Resources
Formatting Help Guide from MetaWiki
ACM Technews Search
IEEE Xplore
http://ieeexplore.ieee.org/search/advsearch.jsp
Google Scholar
Professional Codes of Ethics
National Academy of Engineering
Debate Arguments Pyramid
An outline of argument types.
http://blog.createdebate.com/2008/04/07/writing-strong-arguments/
HTML to MediaWiki Converter
You may find this tool helpful in converting the content on existing pages of the ethics.csc.ncsu.edu website to MediaWiki markup for your research assignment.
http://labs.seapine.com/htmltowiki.cgi
Work Examples
Research Assignment: CSC 379:Research Assignment Sample
Etc.
Research Assignment Topics
Week 1 pages
- Netiquette Best Practices: Online Communities (CSC 379 SUM2008:Week 1, Group 1)
- Political Uses of Spam for Special Interests and Influencing Elections (CSC 379 SUM2008:Week 1, Group 2)
- Spam (CSC 379 SUM2008:Week 1, Group 3)
- The Effects of Spam-Countermeasures (CSC 379 SUM2008:Week 1, Group 4)
Week 2 pages
- Turn-it-in and MOSS (CSC 379 SUM2008:Week 2, Group 1)
- Alternative Intellectual Property Models (CSC 379 SUM2008:Week 2, Group 2)
- Search Engines (CSC 379 SUM2008:Week 2, Group 3)
- File Sharing Countermeasures (CSC 379 SUM2008:Week 2, Group 4)
Week 3 pages
- Markets for Bug Reports (CSC 379 SUM2008:Week 3, Group 1)
- Costs and Benefits of Malware Countermeasures (CSC 379 SUM2008:Week 3, Group 2)
- Costs and Benefits Password Regulations (CSC 379 SUM2008:Week 3, Group 3)
- Bundling Malware (CSC 379 SUM2008:Week 3, Group 4)
Week 4 pages
- Privacy Policies (CSC 379 SUM2008:Week 4, Group 1)
- Open Government (CSC 379 SUM2008:Week 4, Group 2)
- WAN Internet Filtering (CSC 379 SUM2008:Week 4, Group 3)
- Hidden Tracking Codes (CSC 379 SUM2008:Week 4, Group 4)
Week 5 pages
- Avoiding the Need for Whistleblowing (CSC 379 SUM2008:Week 5, Group 1)
- Open Non-Proprietary Technology vs. Closed Proprietary Technology (CSC 379 SUM2008:Week 5, Group 2)
- Cyberstalking (CSC 379 SUM2008:Week 5, Group 3)
- Decision Support Systems (CSC 379 SUM2008:Week 5, Group 4)