This page provides a tentative schedule for the course.
All reading materials can be accessed via Schmidt Library.
-
For articles in IEEE Computer, select Subject Guides, Engineering, and IEEE Xplore.
-
For articles in Communications of the ACM and other journals, select Articles from the side bar and use Academic Search Complete.
Date Topic Reading Aug 28 Introduction Four Ethical Issues of the Information Age, Richard O. Mason (MIS Quarterly - 3/86) Aug 30 Profession Computing Is a Profession, Andrew A. Chien (ACM - 10/17)
ACM Code of Ethics: A Guide for Positive Action, Don Gotterbarn, Amy Bruckman, Catherine Flick, Keith Miller, Marty J. Wolf (ACM - 1/18)
The Pledge of The Computing ProfessionalSept 4 Responsibility Four Ways to Make CS and IT More Immersive, Thomas A. Limoncelli (ACM - 10/17)
Toward Algorithmic Transparency and Accountability, Simson Garfinkel, Jeanna Matthews, Stuart S. Shapiro, Jonathan M. Smith (ACM - 9/17)
Assuring Software Quality By Preventing Neglect, Robin K. Hill (ACM - 9/17)
Breadth and Depth, Kate Matsudaira (ACM - 11/17)Sept 6 IP - Copyrights Intellectual Property, Part I, Gaff, Loren, and McCool (IEEE - 1/12)
New Exemptions to Anti-Circumvention Rules, Pamela Samuelson (ACM - 3/16)
Who Owns the Social Web?, Catherine C. Marshall, Frank M. Shipman (ACM - 5/17)Sept 11 IP - Patents Why Do Software Startups Patent (or Not)?, Pamela Samuelson (ACM - 11/10)
Software Patents Are Falling Down, Pamela Samuelson (ACM - 11/15)
Disgorging Profits in Design Patent Cases, Pamela Samuelson (ACM - 11/17)
Do Patent Commons and Standards-Setting Organizations Help Navigate Patent Thickets?, Wen Wen and Chris Forman (ACM - 5/16)Sept 13 EXAM I PART I Sept 18 Privacy - I The Tangled Web We Have Woven, Eben Moglen (ACM - 2/13)
Privacy is Dead, Long Live Privacy, Jean-Pierre Hubaux and Ari Juels (ACM - 6/16)
When Does Law Enforcement’s Demand to Read Your Data Become a Demand to Read Your Mind?, Andrew Conway and Peter Eckersley (ACM - 9/17)Sept 20 Privacy - II Can You Engineer Privacy?, Seda Gurses (ACM - 8/14)
More Encryption Means Less Privacy, Poul-Henning Kamp (ACM - 4/16)
Welcome to the Singularity, David Allen Batchelor (ACM - 2/18)Sept 25 Security - I Privacy and Security: Summing Up, Susan Landau (ACM - 11/14)
Cyber Insecurity and Cyber Libertarianism, Moshe Y. Vardi (ACM - 5/17)Sept 27 Security - II I Can’t Let You Do That, Dave, Cory Doctorow (ACM - 12/15) NOTE: This is the Dec 2015 article
Security Assurance, Steven B. Lipner (ACM - 11/15)
Trustworthiness and Truthfulness Are Essential, Peter G. Neumann (ACM - 6/17)
IoT: The Internet of Terror, George V. Neville-Neil (ACM - 10/17)Oct 2 Individual Access to the Internet is a Human Right, Stephen Wicker and Stephanie Santoso (ACM - 6/13)
Does the Internet Make Us Stupid?, Hermann Maurer (ACM - 1/15)
Portable Device Fears Show Power of Social Development, Chris Edwards (ACM - 10/17)Oct 4 Society Beyond Viral, Manuel Cebrian, Iyad Rahwan, and Alex “Sandy” Pentland (ACM - 4/16)
Smartphone Apps for Social Good, Logan Kugler (ACM - 8/16)
Digitocracy, Joel R. Reidenberg (ACM - 9/17)Oct 9 EXAM I PART II Oct 18 Ownership of software
Matt HaszWE CAN’T LET JOHN DEERE DESTROY THE VERY IDEA OF OWNERSHIP
Software Ownership Battle Adds $10M to Cost of ‘Big Dig’, Marc L. Songini (Computerworld - 2/28/2005)
Reasons to Jailbreak Your iPhone (and Not To), Brennon Slattery (PCWorld - 10/10)Oct 23 Microsoft charging for Win 7 support
Nate RussellMicrosoft Relents, Confirms Extended Support Option for Windows 7
Microsoft Warns Windows 7 Is Dangerous To Use [Updated]
You’ll never have to pay for a Mac OS upgrade again, Apple CFO says
Microsoft Silently Kills Windows 7 Security Updates on Older PCs
Microsoft to offer paid Windows 7 Extended Security UpdatesOct 25 Increase in STEM education
Ezra MooreTowards a STEM + Arts Curriculum, Toni Wynn and Juliette Harris (Education Digest - 1/13)
From STEM to STEAM: Brent Bushnell and Eric Gradman at TEDxManhattanBeachOct 30
KEC118Anonymity
Garrett RuthsAnonymity on the Internet: Why the Price May Be Too High, David Davenport (ACM - 4/02)
UH Researcher Finds Anonymity Makes a Difference with Online Comments
Facing the Challenge of Online HarassmentNov 1 Deep fakes Isaac Wheeler deepfakes_faceswap
Letter to Director Coats
There Is No Tech Solution to DeepfakesNov 6 Face ID and Privacy
Rathana PimAbout Face ID advanced technology
Analysis: Apple is sharing your face with apps. That’s a new privacy worry
Apps Might Have Too Much Access to Face ID Data on iPhone XNov 8
KEC118Hacking bodycams
Zack HenryPOLICE BODYCAMS CAN BE HACKED TO DOCTOR FOOTAGE
Hackers hijack surveillance camera footage with ‘Peekaboo’ zero-day vulnerabilityNov 13
KEC118Net Neutrality
Devin RetzlaffThe pros and cons of net neutrality
THE WIRED GUIDE TO NET NEUTRALITY
7 Reasons Net Neutrality Is IdioticNov 15 INCLEMENT WEATHER Nov 20 Ethics of AI
Derek McClellanTop 9 ethical issues in artificial intelligence
The evolution of artificial intelligence
THE SINGULARITYNov 27 Tech Unions
Jason LefeverWorkers of Silicon Valley, It’s Time to Organize
Google Workers Reject Silicon Valley Individualism in Walkout
Why Labor Unions And Silicon Valley Aren’t Friends, In 2 Charts
Software Startup Accused of Union-Busting Will Pay Ex-EmployeesNov 29 Social Media Censorship
Kyle JonesPoll: Most conservatives think social media is censoring them
Facebook, Instagram ban far-right Proud Boys and founder
AP Explains: Gab, where Pittsburgh shooting suspect ranted
How Trump can regulate GoogleDec 4
KEC118Automated Cars: Who do we Kill?
Matt RichieThe Challenges of Partially Automated Driving
Why Self-Driving Cars Must Be Programmed to Kill
Moral MachineDec 6 EXAM II Dec 11