Computer Science 312 Syllabus for Spring 2008
Dr. Carol E. Wolf Office
Website: http://csis.pace.edu/~wolf/ E-mail: cwolf@pace.edu
Office Hours: Mondays and Wednesdays1:00 – 3:00
Text: Annual Editions: Computers in Society, 2008-09, Paul De Palma, editor,
McGraw Hill Contemporary Learning Series, 2007
Date |
Group |
Chapter |
Topic |
Jan 23 |
|
1 |
Overview of course, creation of groups |
Jan 28 |
A |
2 |
Slouching Toward the Ordinary |
|
|
3 |
On the Nature of Computing |
|
|
4 |
The Subprime Loan Machine |
Jan 30 |
|
5 |
Click Fraud |
|
|
6 |
The Big Band Era |
Feb 4 |
|
7 |
The Beauty of Simplicity |
|
|
8 |
The Software Wars |
|
|
9 |
Scan This Book! |
Feb 6 |
|
10 |
National ID |
|
|
11 |
Brain Circulation |
Feb 11 |
|
12 |
The New Face of the Silicon Age |
|
|
13 |
Computer Software Engineers, Occupational Outlook Handbook |
|
|
14 |
The Computer Evolution |
Feb 13 |
|
15 |
Making Yourself Understood |
|
|
16 |
Privacy, Legislation, and Surveillance Software |
Feb 20 |
C
|
17
|
Romance in the Information Age |
D
|
18
|
How Do I Love Thee? | |
|
|
19 |
The Perfect Mark |
Feb 25 |
|
20 |
Back-to-School Blogging |
|
|
21 |
E-Mail Is for Old People |
Feb 27 |
|
22 |
The Copyright Paradox |
|
|
23 |
Piracy, Computer Crime, and IS Misuse at the University |
Mar 3 |
|
24 |
Facing Down the E-Maelstrom |
|
|
25 |
Can Blogs Revolutionize Progressive Politics? |
Mar 5 |
|
|
Midterm Exam |
Mar 10 |
|
26 |
Center Stage |
|
|
27 |
The Coming Robot Army |
Mar 12 |
|
28 |
Why Spyware Poses Multiple Threats to Security |
|
|
|
Library Research Document Due |
Mar 24 |
|
29 |
Terror’s Server |
|
|
30 |
The Virus Underground |
Mar 26 |
|
31 |
Secrets of the Digital Detectives |
|
|
|
Survey Document Due |
Mar 31 |
|
32 |
Data on the Elderly, Marketed to Thieves |
|
|
33 |
The Fading Memory of the State |
Apr 2 |
|
34 |
False Reporting on the Internet and the Spread of Rumors |
|
|
35 |
China’s Tech Generation Finds a New Chairman to Venerate |
Apr 7 |
|
36 |
Is the Crouching Tiger a Threat? |
|
|
37 |
Restoring the Popularity of Computer Science |
Apr 9 |
|
38 |
China’s Computer Wasteland |
|
|
39 |
Cat and Mouse, on the Web |
Apr 14 |
|
40 |
In Search of a PC for the People |
|
|
41 |
A Nascent Robotics Culture |
Apr 16 |
|
42 |
March of the Robolawyers |
|
|
43 |
Best-Kept Secrets |
Apr 21 |
|
44 |
Toward Nature-Inspired Computing |
|
|
45 |
The Intelligent Internet |
Apr 23 |
|
46 |
Mind Control |
Apr 28 |
|
|
Presentation of Group Projects |
May 5 |
|
|
Presentation of Group Projects, Review |
When a group has been assigned a chapter to report on, one member of the group should write a 1 or 2 page summary of the chapter and prepare 1 or 2 Powerpoint slides describing it. The other members of the group should find related material either in print or on the Internet pertaining to the topic in the chapter. Each one should also prepare a 1 or 2 page written summary. The group will then make a presentation during the class time and hand in the written summaries. If we run out of time for the entire presentation, the remainder will be presented during the next class session. If you have any problems printing, email the summary to me, and I will print it out for you. You may also send me the PowerPoint slides and I will make sure that they can be shown on the classroom equipment.
Summaries should be double-spaced and brief. One or two pages are all right,
but three pages will not be accepted. The slides should also be brief with no
more than 4 or 5 bulleted items per slide. The summaries will be graded for
both grammar and content. After they have been returned with corrections, the
corrected versions should be copied into html and posted on a group website.
These websites may be either on a server chosen by the group or on a
The group project will consist of a library research paper, a survey, a statistical analysis of the survey results and a conclusion. The entire project is due at the end of the semester. It should both be presented in class and posted on the website. At the end of the semester, zip up the entire contents of the website and send them to me. I will then post them on my website. No one in the group will receive a final grade until all the material has been posted on the site.
Grades will be determined by two written exams, a midterm and a final, all the presentations during the semester and the final project. Each one of these categories will count for 25% of the grade. All written materials, including exams, should be double-spaced. If your handwriting is hard to read, please print on your exams. Grammar will count on all documents, but spelling will only be graded on papers prepared ahead of time.
Additional Resources:
Herman T. Tavani, Ethics and Technology, Chapter 2, Wiley, 2004.
MLA Citation Style, 6th ed. (2003), http://www.pace.edu/library/pages/instruct/guides/mla6.htm
I. Lee. A Research Guide for Students. http://www.aresearchguide.com/
ACM Code of Ethics, http://www.acm.org/constitution/code.html
John L. Sullivan and Richard G. Niemi, editors, Quantitative Applications in the Social Sciences, Sage Publications Inc., 1983.
http://www.cooper.com/alan/homonym_list.html
Link to Postman's Five Things We Need to Know about Technological Change
Helpful Grammar Handouts from Purdue On-Line Writing Lab
CS 312 Suggestions for Group
Projects
1.
How computer
usage differs between rich and poor schools.
2.
Why do so few
women and minorities choose to work in IT?
3.
Are students
doing less file sharing now that they can buy music on ITunes?
4.
How private is
data on the Internet? Are people buying
more on-line than before?
5.
What are people
doing about spam? Has it decreased after
the new laws?
6.
What do people do
to protect their computers from viruses and worms?
7.
What are
employers now looking for? What is the
effect of ‘off-shoring’?
8.
Who uses Internet
phones, and what is their future?
9.
Does using a
computer cause isolation or greater interaction with others?
10. Is Internet dating effective, and who is doing it?
11. How successful are robots? Who uses them?
12. What effect are social networking sites like MySpace
and FaceBook having on relationships?
How safe is it to use them?
13. Where do people get news and political
information?
14. How safe is electronic voting, and did it affect the last election?
15. Why are fewer students choosing IT as a major?
16. How have IM, PDAs, IPods, etc. changed people’s
lives?