Phil 327 – Ethics in the Information Age --Fall, 2016
Metropolitan Sate University
Paper Assignments (Note: These are carried over from last year. Check back for updated versions before you write your papers)
First Paper Assignment (updated for Fall 2016)
Second Paper Assignment (updated for Fall 2016)
Third Paper Assignment (updated for Fall 2016)
Paper writing guides:
Date | Topic | Reading | Writing Due | Handouts - in class stuff |
---|---|---|---|---|
Aug 24 | Introduction
|
none
|
Cases for Discussion; Discussion Project: Identifying Ethical Issues |
|
Aug. 31 | Overview:
Personal, Professional, and Social Issues in Information Technology
|
1. Quinn,
Chapter 1; |
Response to Readings | Discussion Project Killer Robot |
Sept. 7 | Ethical
Theories 1: Relativism, Religion, Kant
|
1. Quinn,
Chapter 2, the first six sections, through p. 72; |
Response to Readings | Discussion Project: Applying Kant |
Sept. 14 | Ethical
Theories 2: Utilitarianism, Social Contract theory
|
1. Quinn,
Chapter 2, the rest (but skip section 10 on virtue ethics for now); 2. "The Singer Solution to World Poverty" by Peter Singer; 3. Prisoners' Dilemma: Game and Explanation: "We are all Prisoners" and "An Ethic Based on Prisoners' Dilemma" by Jonathan Blumen; (another version of the game) |
Response to Readings | Discussion Project: Applying Utilitarianism;
First Paper Assignment handed out |
Sept. 21 | Professional/Business
ethics 1: responsibilities, standards, codes
|
1. Quinn, Chapter 2, section 10, pp. 88-94; 2. Quinn, Chapter 9, the first five sections, through p. 436 |
Response to Readings | Discussion Project:Applying the Software Engineering Code of Ethics |
Sept. 28 | Professional/Business
ethics 2: whistleblowing, loyalty
|
1. Quinn,
Chapter 9, the rest; 2. "Illusions of whistleblower protection" by Brian Martin, 3. Brian Martin's summary of Robert Jackall's discussion of whistleblowing; 4. Summary of Jackall's book "Moral Mazes" (pdf) by Damian Grace, University of New South Wales |
Response to Readings; First Paper Due |
Discussion Project: Whistleblowing |
Oct. 5 | Computer Security and
Reliability
|
1. Quinn, Chapter 7: the whole thing (this is a change from what was listed previously) If you are pressed for time, skip section 7.3 on malware. |
Response to Readings | Discussion
project on software warranties
|
Oct. 12 | Spam, Pornography, Free Speech, Censorship | 1. Quinn, Chapter 3; 2.
Brian Leiter on Cyber-Cesspools, cleaner version, explicit version |
Response to Readings | Second Paper Assignment handed out |
Oct. 19 | Privacy
1
|
2. MSNBC article on privacy law |
Response to Readings |
|
Oct. 26 | Privacy
2
|
1. Quinn,
Chapter 6; 2. plus whatever you have time for from the articles listed on this page |
Response to Readings | Discussion project on Surveillance
|
Nov. 2 | Intellectual
Property 1
|
1.Richard Stallman, Misinterpreting Copyright—A Series of Errors 2. Quinn, Chapter 4 3. links to further (optional) materials on copyright |
Response to Readings; Second paper due | Larry Lessig's TED talk Discussion project on Copyright |
Nov. 9 | Intellectual
Property 2
|
1. Benkler, Wealth of Networks, Introduction
to Chapter 2 (pp. 35-41); |
Response to Readings | Film: Revolution OS |
Nov. 16 | The
Internet and Democracy
|
1. Benkler, Wealth of Networks, Chapter
7 - html
here, pdf
here (Chapter 6 is optional); 2. "The Daily We" by Cass Sunstein; 3. "Reflections on Information Technology and Democracy" by Joshua Cohen |
Response to Readings | Discussion Project on the Internet and Democracy Benkler Notes |
Nov. 23 | Access and Equity | Quinn, Chapter 10 | Response to Readings | Story of Stuff videos: Stuff in general Electronic stuff |
Nov. 30 | Wrap Up |
|
Third paper due |