Course website : https://blogs.cofc.edu/olmsteda
Email: Please use firstname.lastname@example.org with Subject = CSCI392
Office: Harbor Walk East 315
Office hours: Via Email
Class place and time
Trip leaves HWE June 5th around noon and we will be back on June 8th around 5pm. Remainder of course will be done online.
CSCI 392 Seminar on Computing and Society –
A seminar course to prepare majors for careers in CS by discussing and studying professional, ethical, legal, and social issues and responsibilities in computing. Local and global impact of computing on individuals, organizations, and society will also be addressed. Oral presentations and written work will be required.
Prerequisites: CSCI 221.
- Understand the main premises of major theories of ethics.
- Explain professional, ethical, legal, and social issues and responsibilities in computing.
- Explain the importance of security and privacy in computing.
- the impact of computing on individuals and society.
- the need for engaging in continuous professional development.
- oral presentations on assigned ethical, legal or social issues.
- a paper on your own past and anticipated experiences with continuing professional development.
100-92 (A); 91-89 (A-); 88-86 (B+); 85-82 (B); 81-79 (B-); 78-76 (C+); 75-72 (C); 71-69 (C-); 68-62 (D); else (F)
50% Class Discussion Participation
30% Extended Abstract and Presentation
10% 2nd Authorship
10% Virtual Presentation
Class Discussion Participation
While on our trip, you are expected to contribute you opinions and interact.
Research Paper Presentation
Each student in the class will choose a research paper. The student will give a 10 minute presentation to the class about the research paper.
Extended Abstract and Presentation
Over the semester students will work on an individual software ethics hypothesis. The student will disseminate the results in the form of an extended abstract. The extended abstract will be submitted to one of the following conferences:
- World Congress on Internet Security (WorldCIS-2016)
- The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015)
The paper will have have the following contents:
- Your name, 2nd author name, my name
- Related Work
- Hypothesis, Implementation & Results
All student will produce a PowerPoint presentation (not more than 15 slides) with audio, which will be uploaded on youtube.
1. The presentation should be between 15 to 20 minutes.
2. You are expected to give a brief introduction:
a) “This presentation is for the ____________ conference”
b) Title of your presentation;
c) Your name, 2nd author name, my name and affiliation (College of Charleston).
3. It is important to include the email address, so that participants will be able to get in touch with you if they have further questions.
Every student will partner with another student to be the 2nd author on the paper. The 2nd author will have submit comments and changes to the first authors paper. You should spend 1/2 to 1 hour per week reading and commenting on the other paper.
Please read the College of Charlestons Student Code of Conduct. When you come to class please turn off your cell phones and all other electronic communication devices. I do encourage discussion so if you have a question do not hold back from interrupting me if you are afraid I have moved on. If it is something I will talk about a little later, I will note it on the board so we do not forget.
If you have a documented disability and are approved to receive accommodations through SNAP Services, please contact me.
Student Honor Code
I expect you to abide by the Honor Code and the Student Handbook: A Guide to Civil and Honorable Conduct. If you have a question about how to interpret the Honor Code, ask before acting! I encourage collaboration, but you must document it. Thus, each student will submit their own homework and, when collaborating, provide a reference to those people and documents consulted.