CSC 379: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
m (→Week 4 pages) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 23: | Line 23: | ||
Research Assignment: [[CSC 379:Research Assignment Sample]] | Research Assignment: [[CSC 379:Research Assignment Sample]] | ||
===Etc.=== | |||
[[temp001]] | |||
Line 67: | Line 70: | ||
= Week 5 pages = | = Week 5 pages = | ||
''' | * [[CSC 379 SUM2008:Week 5, Debate | '''Week 5 Debate Topic''']] | ||
* Avoiding the Need for Whistleblowing ([[CSC 379 SUM2008:Week 5, Group 1]]) | |||
* Open Non-Proprietary Technology vs. Closed Proprietary Technology ([[CSC 379 SUM2008:Week 5, Group 2]]) | |||
* Cyberstalking ([[CSC 379 SUM2008:Week 5, Group 3]]) | |||
* Decision Support Systems ([[CSC 379 SUM2008:Week 5, Group 4]]) |
Latest revision as of 20:44, 6 August 2008
Class Resources
Formatting Resources
Formatting Help Guide from MetaWiki
ACM Technews Search
IEEE Xplore
http://ieeexplore.ieee.org/search/advsearch.jsp
Google Scholar
Professional Codes of Ethics
National Academy of Engineering
Debate Arguments Pyramid
An outline of argument types.
http://blog.createdebate.com/2008/04/07/writing-strong-arguments/
HTML to MediaWiki Converter
You may find this tool helpful in converting the content on existing pages of the ethics.csc.ncsu.edu website to MediaWiki markup for your research assignment.
http://labs.seapine.com/htmltowiki.cgi
Work Examples
Research Assignment: CSC 379:Research Assignment Sample
Etc.
Research Assignment Topics
Week 1 pages
- Netiquette Best Practices: Online Communities (CSC 379 SUM2008:Week 1, Group 1)
- Political Uses of Spam for Special Interests and Influencing Elections (CSC 379 SUM2008:Week 1, Group 2)
- Spam (CSC 379 SUM2008:Week 1, Group 3)
- The Effects of Spam-Countermeasures (CSC 379 SUM2008:Week 1, Group 4)
Week 2 pages
- Turn-it-in and MOSS (CSC 379 SUM2008:Week 2, Group 1)
- Alternative Intellectual Property Models (CSC 379 SUM2008:Week 2, Group 2)
- Search Engines (CSC 379 SUM2008:Week 2, Group 3)
- File Sharing Countermeasures (CSC 379 SUM2008:Week 2, Group 4)
Week 3 pages
- Markets for Bug Reports (CSC 379 SUM2008:Week 3, Group 1)
- Costs and Benefits of Malware Countermeasures (CSC 379 SUM2008:Week 3, Group 2)
- Costs and Benefits Password Regulations (CSC 379 SUM2008:Week 3, Group 3)
- Bundling Malware (CSC 379 SUM2008:Week 3, Group 4)
Week 4 pages
- Privacy Policies (CSC 379 SUM2008:Week 4, Group 1)
- Open Government (CSC 379 SUM2008:Week 4, Group 2)
- WAN Internet Filtering (CSC 379 SUM2008:Week 4, Group 3)
- Hidden Tracking Codes (CSC 379 SUM2008:Week 4, Group 4)
Week 5 pages
- Avoiding the Need for Whistleblowing (CSC 379 SUM2008:Week 5, Group 1)
- Open Non-Proprietary Technology vs. Closed Proprietary Technology (CSC 379 SUM2008:Week 5, Group 2)
- Cyberstalking (CSC 379 SUM2008:Week 5, Group 3)
- Decision Support Systems (CSC 379 SUM2008:Week 5, Group 4)