Reading List for CS 461 Winter 2018
[T1] [T2] [T3] [T4]
[T5] [T6] [T7] [T8]
[T9] [T10] [T11]
Our text:
- Baase, Sara A Gift of Fire:Social, Legal, and Ethical Issues for Computing Technology. 4th edition. Upper Saddle River, N.J.: Pearson-Prentice Hall.
(Using 4th edition since that's what the bookstore sold. 5th edition pages will be given.)
This source is referred to as Baase. in the list below.
Topic One - Privacy in the Business and Social Sector
Date: January 17
Leader: Nathan F.
Readings:
- Baase. "2.3 The Business and Social Sector." pp 70-83 (5th ed: pp 63-76)
Topic Two - T.B.A.
Date: January 24
Leader: Beni N.
Readings:
- Baase 3.6: Net Neutrality - Regulations or the Market. pp. 169-171 (5th ed: sec 3.7 pp 178-182).
- Zelnick, Robert, et al. "THE NETWORK-NEUTRALITY DEBATE." The illusion of net neutrality: political alarmism, regulatory creep, and the real threat to Internet freedom, Hoover Institution Press, 2013, pp. 9-18. (a pdf is posted on socrates)
Topic Three - Can We Trust Computers?
Date: January 31
Leader: Annie L.
Readings:
Topic Four - Cryptocurrencies
Date: February 7
Leader: Caleb G.
Readings:
- White, Lawrence. "The Market for Cryptocurrencies". Cato Journal. 35 (2015): 383-387. (pdf on socrates)
- Wright, Gilly. "Is Bitcoin Good For Business?" Global Finance Jun 2014. pg 16-19. (pdf on socrates)
Topic Five - Software Patents
Date: February 14
Leader: Farai G.
Readings:
- Baase: 4.5 Patents for Inventions in Software. pps 214-220. (5thed 4.6 pps 230-236)
- Huang, Andrew. The Hardware Hacker: Adventures in Making and Breaking Hardware. No Starch Press. 2017. excerpt pps. 115-117. (.docx on socrates)
Topic Six - Can We Trust Computers?
Date: February 21
Leader: Amy I.
Readings:
Topic Seven - Employee Monitoring
Date: February 28
Leader: Dominique M.
Readings:
Topic Eight - Are We Losing Jobs to Technology?
Date: March 14
Leader: Cliffton B.
Readings: .
Topic Nine - The Digital Divide
Date: March 21
Leader: Joseph C.
Readings:
Topic Ten - Hacking: Does It Do More Harm Than Good?
Date: March 28
Leader: Frank N.
Readings:
- Baase. "5.2: Hacking." pp 230-250. (5th pp 249-256