5

GE-013-056, CS 375, Computers and Society – General Education Synthesis Course - Area B4 or D4

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA

ACADEMIC SENATE

GENERAL EDUCATION COMMITTEE

REPORT TO

THE ACADEMIC SENATE

GE-013-056

CS 375, Computers and Society – General Education Synthesis Course

Area B4 or D4

General Education Committee Date: 10/11/06

Executive Committee

Received and Forwarded Date: 11/08/06

Academic Senate Date: 11/15/06

First Reading

1/24/07

Second Reading

Background

The College of Science, Department of Computer Science, is proposing CS 375, “Computers and Society as a General Education Synthesis Course for Area B4 and D4.

Resources

Dr. Lan Yang, George Rainey, Claudia Pinter-Lucke

Discussion

This course was presented to the General Education Committee on October 4, 2006.

The course deals with the Impact of computers on individuals and on society. Includes various current uses of computers, how these have evolved, and what the future might bring. Also covered: benefits and dangers of information technology; how the Internet and computers have fundamentally changed the way we work, play, and interact with others; consequent rise of new social and legal issues, making it essential for everyone to acquire a working understanding of the role of computers in our daily lives. Prerequisites are Area B1, B2, B3 and Areas D1, D2, D3.

Recommendation

The GE Committee has found this course to be in compliance with the synthesis course guidelines for GE sub-area B4 and D4. There were no comments on the Undergraduate Studies website. The course was approved by the GE Committee on May 3, 2006 and again, unanimously, by this year’s GE Committee on October 4, 2006. It is now forwarded to the Academic Senate for consideration.

COURSE OUTLINE

1)  Catalog Description

CS 375 Computers and Society (4)

Impact of computers on individuals and on society. Various current uses of computers, how these have evolved, and what the future might bring. Benefits and dangers of information technology. How the Internet and computers have fundamentally changed the way we work, play, and interact with others. Consequent rise of new social and legal issues, making it essential for everyone to acquire a working understanding of the role of computers in our daily lives. 4 lecture-discussion. Prerequisites: Completion of courses in GE areas B1-B3 and D1-D3

2)  Required Background of Experience

Completion of courses in GE areas B1-B3 and D1-D3

3)  Expected Outcomes

o  Understand how information technology gives rise to social issues and ethical dilemmas

o  Understand specific roles computing plays in our daily lives and have a basic appreciation of how it works

o  Be able to discuss the benefits offered by computing technology in many different areas, and the risks and other problems that are created by this technology

o  Understand some of the social, legal, philosophical, political, constitutional, and economic issues related to computers

o  Analyze computing trends of the past and project into the future to anticipate changes that are likely

o  Be able to explore the arguments on all sides of a controversial issue, and be able to argue convincingly for the position you select

o  Be more aware of current social and legal developments related to computers

4)  Text and Readings

A variety of resources will be used, including books, movies, magazines, articles and web sites. The resource list will be refreshed periodically to stay current. Here is the initial list:

o  Primary textbook: Sara Baase A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet, Second Edition, Prentice Hall, 2003.

o  Books

i.  Richard Spinello and Herman Tavani (Eds), Readings in CyberEthics. Second edition, Jones and Bartlett, 2003.

ii. Michael Crichton, Prey. Avon, 2003.

iii.  Roger Penrose, The Emperor's New Mind: Concerning Computers, Minds, and the Laws of Physics. Oxford University Press, 2002.

iv.  Mitchell Waldrop, The Dream Machine : J.C.R. Licklider and the Revolution That Made Computing Personal. Penguin, 2002.

v. Robert Heinlein, The Moon is a Harsh Mistress. Orb Books, 1997.

vi.  Hubert Dreyfus, What Computers Still Can't Do: A Critique of Artificial Reason. MIT Press, 1994.

vii.  Ray Kurzweil, The Age of Intelligent Machines. MIT Press, 1990.

o  Movies

i.  I, Robot. Alex Proyas (director), 2004.

ii. Artificial Intelligence. Steven Spielberg, 2001.

iii.  The Net. Irwin Winkler, 1995.

iv.  2001, A Space Odyssey. Stanley Kubrick, 1968.

o  Magazines, articles and web sites

i.  Computers and Society, on-line magazine published by ACM SIGCAS. http://www.computersandsociety.org/

ii. Richard Epstein, The Case of the Killer Robot. http://onlineethics.org/cases/robot/robot.html

iii.  Nancy Leveson & Clark Turner, An investigation of the Therac-25 accidents. IEEE Computer 26(7):18-41, July 1993.

iv.  Cybercrime web site maintained by US Department of Justice. http://www.cybercrime.gov/

5)  Minimum Student Materials

Assigned textbook and access to resources listed above

6)  Minimum College Facilities

“Smart” LCT classroom; Internet and library access

7)  Course Outline

Topics will be selected from the following list:

Database privacy There is a great deal of information about all of us recorded in computer databases. What rules should govern how this information is used? What do the privacy notices that we receive from our banks and financial institutions really mean?

Privacy vs. National Security New encryption methods make it possible to keep e-mail and phone conversations secret from others. How should our desire for privacy be balanced with the need of law-enforcement agencies to intercept communications of suspected criminals or terrorists?

Web publishing: Freedom vs. Responsibility How serious are the problems created by Web sites that contain obscene or inappropriate materials, such as pornography, hate material, bomb-making information, and so on? Should there be any restrictions on the material that is put on the Web?

Software risk and reliability Computers are increasingly used to control medical devices, automobiles, aircraft, and other safety-critical systems. How safe are such systems? What can we do to manage the risks involved?

Copyright issues in the electronic age It is easy to use computers to copy music, videos, software and books in violation of copyright law. What is the extent of this problem? What can or should be done about it?

Ubiquity of computers: history and current trends Compared to 40 years ago, how have computers altered banking, commerce, communications, entertainment and other sectors? What changes are right around the corner?

Potential dangers of emerging technologies Some leading thinkers have expressed concern on the possible adverse effects of new technology, including AI, nanotechnology and biotechnology. What is the basis for these fears, and are they justified?

Terrorism and cyber-security How real are the threat of cyber-terrorism? What are the issues in information security, and what can we do about them?

Future of Artificial Intelligence and pervasive computing Is the notion of intelligent, embedded, integrated and pervasive computing merely science fiction, or the dawn of a new era in computing?

There are usually multiple sides to the questions we will consider in this course. We will spend much of our class time discussing the issues and exploring different points of view.

8)  Instructional Methods

A variety of methods will be used to help students achieve the learning outcomes:

o  Lectures on specific topics and issues

o  Class discussions on assigned reading

o  Student presentations with feedback from peers and instructor

9)  Evaluation of Outcomes

Attendance and Class participation 10%

Weekly response paper 20%

Term paper and presentation 20%

Midterm Exam 20%

Final Exam 30%

10)  Assessment of Outcomes

In addition to class discussion, student presentations and written exams, the following outcomes assessment methods will be used:

Students will write a term paper on an approved topic based on a preliminary proposal. The paper will involve substantial research; address social, ethical, historical and aspects of a computer-related topic; and present all sides of each issue. Papers will be rated on structure, content, language skill and support.

Some combination of surveys, interviews and portfolios will be used for GE synthesis assessment, following prescribed guidelines.