COSC3325 (Computer Laws and Ethics) Course Syllabus Spring 2010 Instructor: Dr. Hikyoo Koh, Professor of CS E-Mail: hkoh@My.LAMAR.EDU (or HKPK32@Yahoo.Com) URL: galaxy.cs.lamar.edu/~hkoh Office: MA68 Phone: 880-8779 (Cell: 808-2554901) Office hours: MW: 15:00-16:00 TTh: 11:00-12:00 Sat: 11:00-14:00 (About every other Saturday, with appointments preferred) Others by appointments. Required textbook: A Gift of Fire, 3rd edition, by Sara Baase, Prentice-Hall, 2008. Other references: 1. Ethics and Technology, third edition, by Herman Tavani, John Wiley $ Sons, Inc., 2011. 2. Introduction to Cryptography with Coding Theory, by Wade Trappe and Lawrence Washington, Prentice-Hall, 2006. 3. Computers Ethics, Third Edition, by Deborah G. Johnson, Prentice-Hall, 2001. 4. Ethical and Social Issues in the Information Age, 2nd eidtion, by Joseph Migga Kizza, Springer-Verlag, 2003. 5. Ethics and Computing, Third Edition, edited by Kevin W. Bowyer, IEEE Press, 2005. Objectives: 1. Improving Communication skills (oral and written) 2. Understanding ethical foundations and importance of Ethics in Professional life and conducts. 3. Understanding the importance of social impacts and responsibilities of Professional conducts. 4. Understanding pertinent US laws governing computer professionals. 5. Engaging in independent study. Topics: 1. Computer History 2. Traditional Ethical Theory Universalism vs. Relativism What is right is right for everyone and everywhere and everytime. There is no absolute or universal right or wrong. Consequentialism vs. Deontologism Consequence of behaviors in terms of Common Good Nature of the behaviors themselves with no regard to consequence Motives, Universal law, Kant's Categorical Imperative (The Principle on which a person of Good Will acts) Duty (Hegel's) Utilitarianism vs. Non-Utilitarianism (egoism) Total sum of happiness/pleasure (Greatest happiness of the greatest number of people) Self-Interest only (Thomas Hobbes, John Dewey) 3. Ethical Codes of Professional Organizations 4. Social Impact and Computer applications Scientific Applications Business Applications Network Communications Expert Systems Applications Web Applications: Commerce Education Employment Test-1 5. Computer Crimes Fraud, Theft, Espionage Hardware/Software Theft 6. Security and Cryptography 7. USA Legal System Hierarchy and Computer Laws Freedom of Information Act (1966) Computer Security Act (1987) Copyright Act (1976) Patents (Title 35): American Inventors Protection Act of 1999. Computer Fraud and Abuse Act (1986) National Information Infrastructure Protection Act, 1996 Child Online Protection Act (COPA), 1998 Children's Internet Protection Act (CHIPA), 2000 Digital Millennium Copyright Act, 2000 Gramm-Leach-Bliley Financial Services Modernization Act, 2000 USA PATRIOT Act, 2001 Test-2 8. Ownership of Computer Software and Intellectual Property 9. Privacy Final Exam. Grading method: 2 Tests: 200 points Final Exam: 200 points 4 Reports and class presentations: 80 points a. Ethical Foundations b. Application Evolution and Social Impacts/Responsibilities c. Computer Crimes/Virus and Security d. Semester Project on any course related topics 2 programs: 40 points Occasional Quizzes: 40 points ------------------------------------------------ TOTAL MAX: 560 points The final grade will be primarily determined by your class average as follows: 88% or higher: A Else 78% or higher: B Else 68% or higher: C Else 58% or higher: D Else: F Students with Disabilities: This course complies with the University Policies on Disability, Accommodations, and Academic Honesty as published in the Student Handbook and also in the Computer Science Department Policy. Online Course Evaluations. Lamar University encourages students to evaluate online the courses they take and the instruction they receive via a contract with a national company, OnlineCourseEvaluations.com. The evaluation instruments themselves were developed by LU faculty and administrators. Evaluation windows for fall and spring courses open two weeks before the final examination period and close at the end of the last class day. The student is notified of the specific dates at his/her myLAMAR e-mail address. If course evaluations are given during summers, mini semesters, and other compressed terms, evaluation windows are extended past the last class meeting. Evaluations are completely anonymous, and neither LU faculty nor LU administrators have the ability to determine the name of the student who completed a specific evaluation form. The primary purpose of course evaluation is the improvement of instruction. That is, after the semester has ended and grades have been awarded, I am able to access the results of my course evaluations, to include all student comments. I analyze the data and read the comments, and often use student observations and suggestions to make changes in course content and delivery. The results of course evaluations are also used by chairs and deans as one factor in decisions involving merit pay, tenure, and promotion. Both the administration and I take your input via course evaluations very seriously, and I encourage you to participate in this process. Any questions or comments you have about the process should be addressed to Dr. Tom Matthews, University Assessment Coordinator, at 409-880-2385 or tom.matthews@lamar.edu. Thank you. NOTE: 1. Every thing you turn in to the instructor to be graded is expected to be your own work at least for the most part. In an unpleasant event of the instructor identifying two or more students having submitted an identical or a ver similar report, all students involved will get ZERO credit. 2. All reports/programs will be accepted only in class and only when they are due. No sooner or no later. 3. Every five unexcused absences will lower your final grade by one letter grade. 4. To encourage class participations, at the end of each presentation session (there are four of them scheduled), you will turn in your choice of the two best presentations along with your justifications. 5. Topics for reports will be provided later. 6. Student participations are very strongly encouraged. Especially during student oral presentations, you are strongly encouraged to ask questions and at the end of each round you are required to turn in your choices of the two best presentations along with your objective justifications of your choices, as stated above.