Sunteți pe pagina 1din 4

CSC 301

Department of Computer Science


Course Course #
Computers and Society CSC 301; Class No.: 22272, 7:00 8:15 PM, T TH in
SCC 800
Instructor Phone Email Office Hours
W. Peter Blankenship
(310) 764-9485
wpbcsc301@gmail.com
6:30 - 7:00 PM T TH; By appointment
Prerequisites
Grade of C, or better, in CSC121, or CSC 111 or CIS 270
Textbook
A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet
Author: Baase, Sara Publisher: Pearson, Prentice Hall ISBN-13: 978-0-13600848-4, Copyright 2008; 3rd Edition Also: The United States Constitution
References:
www.nist.gov Resource for Federal Information Process Standards and
Federal guidance on Computer Security Issues
www.gao.gov Resource for Studies/Guidance on Information Technology
Issues and Reports of concern to Congress
http://www.dhs.gov/files/cybersecurity.shtm US Department of Homeland
Security CyberSecurity Division access to information and recent laws and
information from Dept of Justice on Computer Crime Legal Resources

http://www.justice.gov/criminal/cybercrime/cclaws.html US Department of
Justice
http://www.htcia.org/

Hi Tech Crime Investigation Association

http://www.cnss.gov/ The Committee on National Security Systems


http://www.fas.org/irp/crs/RL32357.pdf Congressional Research Service
Report Computer Security : A Summary of Selected Laws thru 2004
https://buildsecurityin.us-cert.gov/swa/ Software Assurance Information
Clearinghouse
http://www.cnss.gov/Assets/pdf/cnssp_1.pdf
http://www.dtic.mil/whs/directives/corres/pdf/852301p.pdf
COMSEC Policy
List National COMSEC Policies
List National COMSEC Procedures
Evaluation Procedures and Grading System
2 Essays (term papers)
2 Oral Presentations
Midterm
Attendance/Class Participation
Final

10%
20%
20%
15%
35%

Class web site


http://web.me.com/wpbapple/csc301.htm

Attendance Policy
Attendance for lectures is strongly encouraged as each student is responsible for
material covered in class and class participation is noted and can push one over the
top. Finally, please note that there will not be any make up assignments, or tests, and
each student is required to take the final on Tuesday, May 17 from 7:00 PM
9:00 PM, 2011; failure to take the final will result in a grade of F for the course.

Last Day to withdraw w/o serious accident/illness: Thursday, February 10, 2011
Acrobat reader is required for some pages; download free from:
http://www.adobe.com
Course Overview

Study of the ethical, legal, psychological, economic, political, societal, and theoretical
implications and limitations of the uses of digital computers.
Course Outline
Topics covered in this course (not necessarily in this order) include the following:
Societal context of computing
Introduction to the societal implications of computing and belief introduction to
references
Methods and tools of analysis,

Identifying and evaluating ethical choices Understanding the societal context of design
Professional and ethical responsibilities

Community values and the laws by which we live The nature of professionalism
Maintaining awareness of consequences Ethical dissent and whistle-blowing Codes of
ethics, conduct, and practice (IEEE, ACM, SE, AITP, ISACA, IIA, ISSA and so
forth)
Risks and liabilities of computer-based systems

Implications of software complexity Risk assessment and management See


information available from Software Assurance Information Clearinghouse
Intellectual property

Foundations of intellectual property Copyrights, patents, and trade secrets see


Department of Justice site intellectual property tab for current and additional
information
Privacy and civil liberties

Ethical and legal basis for privacy protection Privacy implications of massive
database systems Freedom of expression in cyberspace a survey of recent federal
laws such as the HIPAA , USA Patriot Act, Homeland Security Act of 2002 and
others. The classification requirements and marking/ physical protection of
electronic Information in Federal Government ( Classified/Unclassified ; Top Secret;
Secret; etc.) and requirement for TEMPEST Technology
Computer crime

"Cracking" ("hacking") and its effects and see references from US Department of
Homeland Security and Department of Justice and the Hi Tech Crime Investigation
Association
Economic issues in computing

Monopolies and their economic implications


In addition, readings from the text will be assigned throughout the semester.
ADA Statement
Students with disabilities, who believe they may need an academic adjustment in this
class, are encouraged to contact the instructor as soon as possible to better ensure
receipt of timely adjustments.
Academic Integrity
Each student must do his/her own work; plagiarism and cheating (e.g. stealing or
copying the work of others and turning it in as your own) will not be permitted, and
will result in at least a zero for the assignment/test and possibly an F for the course.
If you are having difficulty, PLEASE come and see me after class, or during office
hours, for help.

S-ar putea să vă placă și