Phil 327 – Ethics in the Information Age -- Spring, 2009
Metropolitan Sate University
Paper writing guides:
Tentative schedule of topics and readings (schedule of writing assignments is firm):
Date |
Topic |
|
Writing
assignments/ Discussion Projects |
January
12 |
Introduction |
none |
|
January
19 |
MLK
|
|
|
January
26 |
Overview:
Personal, Professional, and Social Issues in Information Technology |
Quinn,
Chapter 1; Benkler, Wealth of
Networks, Introduction (online here);
The Case of the Killer Robot (online here) |
Response
to reading; Cases
for Discussion |
February
2 |
Ethical
Theories 1: Relativism, Religion, Kant |
Quinn,
Chapter 2 through p. 74; Excerpts
from Kant (with notes); "The
Truth in Ethical Relativism" by Hugh LaFollette |
Response
to reading;; Discussion Project: Applying
Kant |
February
9 |
Ethical
Theories 2: Utilitarianism, Social Contract theory |
Quinn,
Chapter 2, the rest; "The
Singer Solution to World Poverty" by Peter Singer; Prisoners'
Dilemma: Game
and Explanation: "We
are all Prisoners" and "An
Ethic Based on Prisoners' Dilemma" by Jonathan Wallace |
Response
to reading;; Discussion Project: Applying
Utilitarianism |
February
16 |
Professional/Business
ethics 1: responsibilities, standards, codes |
Quinn,
Chapter 8, through p. 408 |
Response
to reading; Mid-term exam questions handed out (due March 2)
|
February
23 |
Professional/Business
ethics 2: whistleblowing, loyalty |
Quinn,
Chapter 8, the rest; also "Encouraging
Internal Whistleblowing in Organizations" by Lilanthi Ravishankar
; "Illusions
of whistleblower protection" by Brian Martin, University of
Wolongong; Brian
Martin's summary of Robert Jackall's discussion of whistleblowing;
Summary
of Jackall's book "Moral Mazes" (pdf) by Damian Grace,
University of New South Wales
|
Response
to reading; |
March
2 |
Computer
Reliability |
Quinn,
Chapter 7 |
Response
to reading; Midterm exam due; Discussion
project on software warranties |
March
9 |
Spring
Break – No class |
|
|
March
16 |
Spam,
Pornography, Free Speech, Censorship |
Quinn,
Chapter 3 |
Response
to reading; |
March
23 |
Privacy
1 |
Quinn,
Chapter 5, through p. 243; MSNBC article
on privacy law |
Response
to reading; |
March
30 |
Privacy
2 |
Quinn,
Chapter 5, the rest; plus whatever you have time for from the articles
listed on this
page |
Response
to reading; Paper topic statement due; Discussion
project on Surveillance |
April
6 |
Intellectual
Property 1 |
Quinn,
Chapter 4 |
Response
to reading; Paper drafts due;Discussion
project on Copyright |
April 13 |
Intellectual
Property 2 |
Benkler,
Wealth of Networks, Introduction
to Chapter 2 (pp. 35-41); Chapter
3 (pp. 59-90); last
section of Chapter 5 (pp. 161-175) |
Response
to reading ; Final Exam questions handed out
|
April
20 |
The
Internet and Democracy |
Benkler, Wealth of Networks, Chapter
7 - html
here, pdf
here (Chapter 6 is optional); "The
Daily We" by Cass Sunstein; "Bloggers
and Parties: Can the Netroots Reshape Democracy" by Henry Farrell |
Response
to reading |
April
27 |
Access
and Equity; course evaluations |
Quinn, Chapter 9 |
Response
to reading; Final Exam due |
May
4 |
No
meeting - email papers |
None |
Final
version of papers due |