Syllabus for
CSCI 494 Social and Ethical Issues in Computing
Spring 2016

12 Jan

Cary G. Gray
Office: Meyer 159, x5875
Office hours: MF 1:30-2:30 p.m.
WTh 1:30-3:30 p.m.
and by appointment (esp. Thursday mornings)

Class meetings

T 8:30–10:20 a.m., Meyer 131
Final meeting: 10:30 a.m.–12:30 p.m on Wednesay, May 4 (may be rescheduled later that day)

On-line resources

Additional (and updated) course information will be available at the class page at

http://cs.wheaton.edu/˜cgray/csci494/

Description

CSCI 494. Social and Ethical Issues in Computing.
Study of the ways in which the computer and communications revolution is changing society. Develop an awareness of and sensitivity to the ethical issues that arise in computer science and related professions. Prerequisite: Senior standing in the major. (2 hours)

CSCI 494 is the capstone course for the computer science major; as such it is supposed to provide an opportunity to sum up your study of computing at Wheaton and how it relates to other disciplines you have studied and to your faith. Because this is a capstone course, you should be taking it near the end of your time at Wheaton: you should be close to completing both the computer science major and the general-education requirements.

The way our capstone is defined by the catalog does not leave us much time for reviewing the discipline; we will instead focus on how computing and related technologies interact with humane concerns. In this class you will:

This is not a typical computer science course: it will involve primarily reading, discussion, and writing. There will be no programming assignments. The level of your prepared participation in class will be the principal factor that determines how much you get out of this course.

Grading and assignments

Your grade will be based on:

Class participation
(20%) The quality of your participation is important. Your written responses to readings (see below) are included in this portion of your grade.
Leading a class discussion
(10%) You will, with a partner, be responsible for leading the discussion for half of one class meeting, in an area in which you will also do additional reading. Details will be provided separately.
Short essays and reading responses
(30%) A few short essays will be assigned during the term. Each should be 1–2 pages in length. These can be informal, but should be organized well and reflect careful thought about the assigned topic. (Some initial due dates are on the syllabus; topics will be distributed separately.)
Final paper
(40%) Think of this as your take-home final: you are to write a 8–12 page paper on a topic related to the course. Details will be provided later.

All written work should be typed, neatly formatted, and double-spaced. Turn in hardcopy unless specifically instructed otherwise. For purposes of counting pages, use a 10–12 point font with 1-inch margins. Make citations in standard form (such as MLA or a common form supported by LaTeX/bibTeX), with the special case that you you may reference all provided articles and textbook selections with the bracket form shown below and on the class readings page.

Attendance

Because participation is such an important part of the course, there will also be a significant penalty for absences and late arrivals. Your late arrival would interfere with class for your fellow students; so attendance will be taken at the beginning of each class meeting, and you will not be counted present if you arrive late. (I suggest you plan to arrive a few minutes early.) You will be allowed up to two absences without penalty; for each subsequent absence your course grade will be penalized one-half letter per meeting. If you must miss, I can consider accommodating you only if you behave responsibly—including letting me know in a timely manner. If you have another obligation that interferes with your timely arrival, I expect you to keep me informed—just as you would an employer.

Your presence in class calls for your full attention. That implies no use of networked devices to be virtually somewhere else. If you need to use a computer of some sort for access to your textbook or to take notes, you should do so with the networking turned off, and you are implicitly promising that you will not use it for any other purpose during class.

Academic Integrity

In your writing for this course, you need to be sure that you clearly indicate when you quote (use someone else’s language) and where you pick up ideas. Avoid autoplagiarism, too: don’t recycle work from other classes without citing it as such.

Other policies

Special circumstances and needs Wheaton College is committed to providing reasonable accommodations for students with disabilities. Any student with a documented disability needing academic adjustments is requested to contact the Academic and Disability Services Office as early in the semester as possible. Call 630.752.5941 or email jennifer.nicodem@wheaton.edu for further information.

Gender-neutral language For academic discourse, spoken and written, the faculty expects students to use gender inclusive language for human beings.

Assigned and additional readings

The textbook for this class is:

Hester and Ford, eds., Computers and Ethics in the Cyberage, Prentice-Hall, 2001.

In the schedule below, the readings that start with an number (such as [1Mumford]) are from that chapter in the textbook. Links to the other readings will appear in the online version of the readings list. There will also be a shelf of books available in the CS lounge in which you can find additional readings.

The assigned readings should be considered a minimum. You will find links or references for additional readings in the online list, and I will continue to update the list during the semester. You should be looking for articles in regular news sources; feel free to point me (or the whole class) to anything interesting and relevant that you find. Look for sources of high quality; some blogs do qualify (I’ve included pointers to some), but most would not.

You are required to keep up with one additional online source, the RISKS Digest. RISKS publishes irregularly; it is most easily accessed via the online archive at

http://catless.ncl.ac.uk/Risks/

You are responsible for all issues from 29(19) (dated 28 Dec 2015) through 29 Apr. You should check and read RISKS at least once a week. I also strongly recommend checking the Freedom to Tinker weblog from Princeton’s Center for Information Technology Policy, at

http://www.freedom-to-tinker.com/

See the suggested readings page online for additional suggestions.

Responses to readings In preparation for each class meeting that has assigned readings, should write a short response that indicates what you have read as well as the key ideas and questions the readings raise. Sometimes you will be provided with some specific questions or guidance. You will need to turn in a copy of this response at the beginning of class; I suggest that you keep a copy as part of your notes for discussion.

Initial schedule and readings

As you look at the topics in the schedule below, you may notice that several of them have been major subjects in the news over the last several months. In light of that, there are a couple of days on the schedule for which specific readings will show up on the class web page. You should expect some changes to the lists of both required and suggested readings—and you should feel free to contribute your own suggestions.

Note that the required readings are a minimum. The on-line version of the schedule suggests additional sources, and you will need to go beyond the minimum to get more than a minimal passing grade.

This information appears on a separate page.