Comp 317-001/417-001
Social, Ethical and Legal Issues in Computing
Peter Dordal, Loyola University CS Dept
Summer 2016: Tuesdays & Thursdays 5:30-8:45,
Comm 010 (in the basement).
(The schedule says until 8:45, but we're not having any exams, so we will
end most evenings at 8:30.)
Text: The textbook will be A Gift of Fire, 4th
Edition, by Sara Baase, Prentice-Hall, 2012.
This is also available in an e-book format.
There will be three writing assignments during the course. The first
writing assignment will have a rewriting component: you will
resubmit your first draft.
There will also be one debate/presentation
assignment.
My general course groundrules are
here. Loyola's academic integrity rules are here.
You are expected to be familiar with the rules for quoting other
sources in papers.
Notes and Readings
Notes Organized by Topic
Filesharing and Ethical Theory:
classes 1 and 2
Copyright Laws and Lawsuits:
classes 2 and 3
Privacy from the government:
class 4
Privacy from others: class 5, 6
Free Speech and the Internet: classes 7 and
8
Software Patents: classes 9 and 10
Crime and Hacking: classes 11 and 12
Miscellaneous Topics: trust and
jurisdiction, class 12
Course notes
Most content is now in the files above.
Class 1: Tues, May 24
|
Class 2: Thurs, May 26
|
Class 3: Tues, May 31
|
Class 4: Thurs, June 2
|
Class 5: Tues, June 7
|
Class 6: Thurs, June 9 |
Class 7: Tues, June 14
|
Class 8: Thurs, June 16
|
Class 9: Tues, June 21
|
Class 10: Thurs, June 23
|
Class 11: Tues, June 28
|
Class 12: Thurs, June 30
|
Readings
Before the Week 1 class, read 1.1-1.3 and at least 4.1 (preferably 4.2 as
well)
Before the Week 2 class, please read all of chapter 1 and sections 4.1
through 4.3 of chapter 4.
Paper topics
Paper 1: Copyright and the Cloud, or
Music Sampling, first draft due Friday June 3
Paper 1 final version: due Tuesday June 14
Paper 2: Encryption or Defamation, due
Tuesday June 21
Paper 3: Software Patents or Computer Crime, due
Saturday July 2
Use the following instructions if you want me to encrypt
your papers before I email them back to you.
You will need to install Gnu Privacy Guard, from gnupg.org.
The installation directory must be in your PATH, so that if you type the
command "gpg" it is recognized.
A useful "cheat sheet" for this is at irtfweb.ifa.hawaii.edu/~lockhart/gpg/gpg-cs.html.
The first step is to create your keypair:
gpg --gen-key
Mostly the defaults are ok. You will need to enter your real name and email
address; I recommend using your Loyola email.
I had a problem with this: the system needs to generate
random bytes. This is time-consuming. The command waits for what can be
hours.
After you create your keypair, you must extract the public
key:
gpg --export -a
"Your Name" > myname.public.key
This creates the file "myname.public.key". This is what you need to email to
me.
At that point I can install your public key on my keyring, encrypt your
paper, and email you back the encrypted file. You decrypt with, for example:
gpg -d mypaper.gpg
We will consider some of
the topics listed below.
- File sharing and copyright
- Whether there is such a thing as "Intellectual Property"
- The DMCA, and what it means to you
- Software patents
- Issues in software licensing
- Trust and the web: phishing and other matters
- website management: cookies, deep linking, user tracking
- The continuing erosion of privacy, and why nobody cares
- Professional responsibilities in computing fields
- encryption and the law
- How much can you trust your software?
- Hacking
- Antitrust issues in software
Articles, references, and links
General
Don't Talk To Cops,
Part 1, James Duane, Regent University Law School
And an interesting followup: Reminder:
Please Shut Up (advice from an attorney)
Organizations
Association for
Computing Machinery -- The professional organization for computer
professionals (oriented towards programmers). See their USACM
subgroup for public-policy issues. See also the ACM
Code of Ethics.
Electronic Frontier
Foundation -- Founded to fight for citizens' rights in the areas
of privacy, cyberspace freedom (specifically, freedom of speech),
copyrights, and encryption.
American Civil
Liberties Union -- Not specifically concerned with cyberspace law,
but nonetheless very involved in the fight against the Communications
Decency Act. The ACLU has long fought against censorship in any form,
and for personal liberties in general.
Electronic Privacy
Information Center -- They are concerned with both government
surveillance (directly and by searching your records), the scope of
government databases, and encryption.
Computer
Professionals
for Social Responsibility -- "CPSR is a public-interest alliance
of computer scientists and others interested in the impact of computer
technology on society." Includes privacy issues but also professional
responsibilities of programmers and workplace empowerment issues.
Ethics Center for
Engineering and Science A useful compendium of ethics case studies
and other information pertaining to science and engineering.
US
Copyright office home page All sorts of information on copyright
legislation, including the Digital Millenium Copyright Act.
2600, the Hacker Quarterly, leader in
the fight for DeCSS.