Philosophical Inquiry
Domain Application Form

1. Course Title CSC 208 The Computer and Social Responsibility

2. Issues course within the Philosophical Learning Domain

3. Department/Program Proposed by Evelyn Lulis, CTI

4. Course Description:

Information Technology and the rapid pace in which it has advanced have had a tremendous impact on our lives. Changes have been swift and the human capacity to deal them limited. It has been said that our technology has outpaced our humanity. This course will research the new responsibilities technology presents and our ability to deal with these changes in an ethical manner. Students will employ ethicalframeworks, which integrates computer science and ethics, to develop the skills required to examine different sets of assumptions and question them. Case studies will provide a historical perspective for analysis.

Topics Include:

  1. An overview of Computer Ethics
  2. Ethical theories and Analysis Methods
  3. Digital Divide (Multicultural Issues)
  4. Ethics and the Internet
  5. Privacy and Information Access
  6. Freedom of Speech in cyberspace
  7. Ethical Issues and Information security
  8. Computer ethics in the workplace
  9. Intellectual Property
  10. Liability, Reliability, and Safety Issues
  11. Networks

5. Reasons for Inclusion in Liberal Studies as Part of the Philosophical Inquiry Domain

Information technology is moving at a fast pace. Jim Moor stated that “new technologies create policy vacuums and the study of computer ethics is to fill these vacuums” (Johnson, 2001).Students today face many ethical issues regarding technology and need to be equipped to make ethical choices. The use of case studies will present a historical perspective for examining issues. Some questions this course addresses:

Does everyone have the right to information technology? How can information technology be provided to all? What are the costs? What cultural differences exist? Should cultural differences be considered when making decisions on the right to privacy? What cultural issues should be considered when analyzing privacy on a global level? What is private and what is not? Should the Internet be censured? Does everyone have a “natural” right to privacy? What constitutes personal information? What cultural issues should be considered when defining what is private? Do the laws governing printed documents apply to electronic documents? What constitutes computer crime? Should the FBI continue using Carnivore? Who is responsible for computer errors? Who is liable when a medical expert system fails? Are we too dependent on computers?

6. Critical and creative thinking

Students will learn how to conduct ethical analyses on issues and develop these skills through writing analytical papers, weekly writing submissions, essay midterm, and a final project requiring the writing of a code of ethics. Students will examine different sets of assumptions in light of technologicalissues and question them—how they apply, should they be accepted. A conceptual framework, as described by Spinello and Johnson, will be employed.

7. Multicultural perspective

Multicultural aspects will be addressed when dealing with access issues on a local, national, and international basis. The ethical issues of technology will be addresses on various levels—individual, organizational, national, global, and cultural.

8. Reasons for inclusion in the domain as shown in a commitment to emphasis on philosophical issues and methods.

This course is an ethics course dealing with information technology. Issues regarding the ethical use of computing technology will be examined using traditional frameworks for ethical analysis.

9. Pedagogical Approaches

Lectures

  • Class lectures
  • Lecture and discussion

Writing intensive:

  • Weekly Blackboard/COL submissions that are graded
  • Weekly Blackboard/COL submissions also offer an opportunity for peer review/edit
  • Analytic papers, feedback, and rewriting

The use of active learning pedagogies:

  • Active collaborative learning while working in pairs to write code of ethics
  • Debates

Blackboard/COL discussions

  • Weekly writing submission may generate discussions

Use of group projects

  • Debates will be group efforts.
  • Class discussion will also provide the opportunity to work in groups.
  • Final project could require working in pairs on ethics code
  • Original research requirement for debates and ethics code

Original research requirement

  • An emphasis on original rather than secondary works is provided by the requiredBlackboard/COL journal, newspaper, and Internet reading assignments.

10. Assessment strategies

One essay exam (Midterm).

This course is writing intensive: students will write weekly Blackboard/COL postings that are graded and allowing for peer review/edit.

Students will write two ethical analyses on relevant issues, with the option of participating in a debate regarding relevant issues.

Students will write a position paper.

There will be a final project in lieu of a final exam will students will write their own code of ethics annotated with justifications.

Grades will also be based on class participation.

11. Syllabus – attached

CSC 208 The Computer and Social Responsibility

Summary of the course

Information Technology and the rapid pace in which it has advanced have had a tremendous impact on our lives. Changes have been swift and the human capacity to deal them limited. It has been said that our technology has outpaced our humanity. This course will research the new responsibilities technology presents and our ability to deal with these changes in an ethical manner. Students will employ a framework for ethical analysis, which integrates computer science and ethics, to develop the skills required to examine different sets of assumptions and question them, resulting in an informed evaluation of issues.

Textbooks and printed resources

Required Text:

1. Quinn, M. J. (2005) Ethics for the Information Age. NY:Pearson/Addison Wesley.

This new text contains an introduction to ethics—Subjective Relativism, Cultural Relativism, Divine Command Theory, Kantianism, Act Utilitarianism, Rule Utilitarianism, Social Contact Theory, and a comparison of all—and uses these theoriesthroughout the text to provide ethical evaluations of the topics covered. See:

for a complete table of contents.

2. Spinello, R. (2003) Case Studies inInformation Technology Ethics, 2nd ed. Upper Saddle River, NJ: Prentice Hall. See:

A copy of both texts can be provided for viewing.

Supplementary Reading:

  1. Baase, S. (2003) A Gift of Fire, 2ed. Upper Saddle River, NJ: Prentice Hall.
  1. George, J. editor (2004) Computers in Society, Upper Saddle, NJ: Prentice Hall.
  1. Johnson, Deborah (2001). Computer Ethics, 3rd ed. Upper Saddle River, NJ: Prentice Hall.

Possible web site:

WWWEthicsCenter for Engineering and Science at

ACM SIGCAS site.

Prerequisites

No previous knowledge of computers or philosophy is assumed or necessary.

Assignments and Grading

Possible assignments:

  • One essay exam (Midterm) 20%
  • Students will write weekly Blackboard/COL—minimum of two pages—postings that are graded and allow for peer review/edit.These papers should include an analysis of a relevant topic using the toolbox of ethical theories covered in weeks one and two. 10%
  • Students will write threeethical analyses papers on relevant issues explicitly applying the ethical theories discussed during the first two weeks of class. There will be an optional debate regarding relevant issues. 40%
  • There will be a final project in lieu of a final exam will students will write their own code of ethicsannotated with justificationsthat provide a full-fledged rationale for the student's choice ofprinciples. 20%
  • Grades will also be based on class participation: 10%

Week 1

Introduction to course; review syllabus; a brief history of computing. A thorough examination of philosophical theories and ethical frameworks used for ethical analysis: Kantian, descriptive and normative claims, ethical relativism, utilitarianism (act and rule), deontological theories, rights, duty-based ethics, virtue, individual and social policy ethics, social contract.

Readings:

  1. Quinn, Chapter 1 and 2
  2. Spinello, Chapter 1

Supplemental Readings:

  1. Johnson, Chapters 1 and 2

Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of chapter exercises—using the toolbox of ethical theories we are covering. Post this paper on the COL site.

Week 2

Ethical Theories continued

Readings:

  1. Quinn, Chapter 2 continued. A thorough examination of the ethical theories and examples of their application.
  2. Spinello, Chapter 1

Supplemental Readings:

  1. Johnson, Chapters 1 and 2

Assignment One: Write a five page ethical analysis paper one of the topics discussed in the text—see end of chapter exercises, explicitly applying the ethical theories discussed during the first two weeks of class.

Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of chapter exercises—using the toolbox of ethical theories we are covering. Post this paper on the COL site.

Week 3

Networking

Email and spam; Ethical evaluation of Spamming—Kantian, act utilitarian, rule utilitarian, social contract; MAPS and its evaluation—social contract, utilitarian, Kantian; pornography, censorship—Kant, Mill; freedom of expression; ethical evaluation of CIPA—Kantian, act utilitarian, social contract.

Reading:

  1. Quinn, Chapter 3
  2. Spinello, Chapter 2

Case studies:

  1. CHIPA
  2. Multnomah Public Library vs. US
  3. Censorship at New EnglandUniversity
  4. Jake Baker
  5. Compuserve Deutschland

Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of chapter exercises—using the toolbox of ethical theories we covered. Post this paper on the COL site; peer-edit the ones that were posted last week.

Week 4

Intellectual Property

Information Technology and anti-competitive pricing

What is intellectual property? What constitutes fair use? Is it wrong to copy software? Is it wrong to download music? What issues was pertinent regarding the Microsoft case? What the outcome fair? Right-Based analysis and utilitarian analysis of intellectual property rights; proprietary software—social contract theory, Kantian perspective, rule utilitarian, act utilitarian.

Reading:

  1. Quinn, Chapter 4
  2. Spinello, Chapter 3 and 4

Supplemental Readings:

  1. Johnson, Chapter 6
  2. Case studies:
  3. The Napster Case
  4. Notes on software compatibility and reverse engineering
  5. The US Government vs. Microsoft
  6. Ditto.com d Search Engine Baiting
  7. Spiders at the Auction

Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of chapter exercises—using the toolbox of ethical theories we covered. Post this paper on the COL site; peer-edit the ones that were posted last week.

Week 5

Freedom of Speech and Privacy in Cyberspace

Privacy and Information Access

Data mining and privacy

What is privacy? Is there a right to privacy? Does everyone have a “natural” right to privacy? Should some Internet sites be censored? Is the FBI’s Carnivore needed? Should the FBI continue using Carnivore? Dos the government have the right to censure information?Two points of view on privacy: individual privacy vs. society. Should cultural differences be considered when making decisions on the right to privacy? What constitutes personal information? What cultural issues should be considered when defining what is private?

Reading:

  1. Quinn, Chapter 5
  2. Spinello, Chapter 5

Supplemental Readings:

  1. Baase, Chapter 5 Freedom of Speech in Cyberspace
  2. George Part 2: Privacy In the Age of Terror
  3. Johnson, Chapter 5
  4. George (2004) Free speech and the Internet
  5. Case studies:
  6. The Patriot Act
  7. The FBI’s carnivore technology
  8. Security Breach at IKON
  9. HIPPA
  10. Crypto Wars

Assignment Two: Write a five page ethical analysis paper on one of the topics discussed in the text, explicitly applying the ethical theories discussed during the first two weeks of class.

Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of chapter exercises—using the toolbox of ethical theories we covered. Post this paper on the COL site. Peer-edit the ones that were posted last week.

Week 6

Ethical Issues and Information/Network Security

Viruses, worms, Trojan horses, phreaks and hackers, denial-of-service attacks, and online voting. The Robert Morris case evaluated—Kantian, social contract, utilitarian. Stewart Nelson evaluated—social contract theory, Kantian, rule utilitarian, act utilitarian,

Reading:

  1. Quinn, Chapter 6
  2. Spinello, Chapter 6

Supplemental Readings:

  1. Baase, Chapter 3 Encryption and Interception of Communication
  2. Baase, Chapter 8 Computer Crime
  3. Case Studies:
  4. A Harmless Prank
  5. Hactivism
  6. The Case of Craig Neidorf

Week 7

Computer Reliability

Liability, Reliability, and Safety Issues

Who is responsible for computer errors? Who is liable when a medical expert system fails? Are we too dependent on computers? What criteria should be used to evaluate computer models?Are software warranties enforceable? All cases evaluated using Kantian, descriptive and normative claims, ethical relativism, utilitarianism (act and rule), rights, duty-based ethics, virtue, and individual and social policy ethics.

Reading:

  1. Quinn, Chapter 7
  2. Spinello, Chapter 7

Supplemental Readings:

  1. Johnson, Chapter 4 and 8
  2. Baase chapter 4 Can we trust the computer?
  3. Case studies:
  4. THERAC-25 Radiation Overdoses
  5. Intel’s Pentium Chip Product Controversy
  6. Sun Server’s Problems
  7. Chicago
  8. Patriot Missile
  9. AT&T long distance

Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of chapter exercises—using the toolbox of ethical theories we covered. Post this paper on the COL site. Peer-edit the ones that were posted last week.

Week 8

Work and Wealth

Digital Divide (Multicultural Issues)

Does everyone have the right to information technology? How can information technology be provided to all? What are the costs? What cultural differences exist? Automation and unemployment; workplace changes; globalization. All cases evaluated using Kantian, descriptive and normative claims, ethical relativism, utilitarianism (act and rule), deontological theories, rights, duty-based ethics, virtue, individual and social policy ethics, social contract theories.

Reading:

  1. Quinn, Chapter 8

Supplementary Readings:

  1. George, Part Four, Digital Divides
  2. Warschauer, M. (2002). Reconceptualizing the Digital Divide. (April 2004)
  3. Baase pg 370-374
  4. Johnson (2001), Chapter 8 pg 218-25
  5. Case Studies:
  6. Note on the Digital Divide Spinello (2003) Case 8.5

Assignment Three: Write a five page ethical analysis paper on one of the topics discussed in the text using the workable toolbox of ethical theories discussed during the first two weeks of class. This paper will be used in the debates during the last week of class.

Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of chapter exercises—using the toolbox of ethical theories we covered. Post this paper on the COL site. Peer-edit the ones that were posted last week.

Week 9

Professional Ethics

Computer ethics in the workplace

Is it wrong to monitor employees? What is the ethics involving job destruction? Job creation? As before, the workable toolbox of ethicaltheories is used to evaluate all problems: Kantian, descriptive and normative claims, ethical relativism, utilitarianism (act and rule), deontological theories, rights, duty-based ethics, virtue, individual and social policy ethics, and social contract. Codes of ethics are examined.

Reading:

  1. Quinn, Chapter 9

Supplemental Readings:

  1. Baase, Chapter 8 Computers and Work
  2. George (2004) Computer-based monitoring
  3. Case Studies:
  4. E-Mail privacy at Johnson and Dresser
  5. The Topper Travel Agency

Weekly assignment: Write a minimum two page analysis of a relevant topic—see end of chapter exercises—using the toolbox of ethical theories we covered. Post this paper on the COL site. Peer-edit the ones that were posted last week.

Week 10

Debate on Relevant Ethical Issues

Final Project

Write your own code of ethics annotated with justifications that provide a full-fledged rationale for your choice ofprinciples.