Instructor: Dr. L. Kleiman
Course Title: Computer Ethics
Department: Philosophy
Cat. No.: Pl 49
451-4143
kleimal@sunysuffolk.edu
http://www.sunysuffolk.edu/Web/Selden/Philosophy
This course will provide the student with the tools:
(a) to examine and understand the major competing ethical theories,
Egoism, Utilitarianism, and the various forms of `traditional moralism;'
(b) to apply ethical theory to contemporary moral issues arising primarily
out of recent developments in information technology;
(c) to clarify and deepen moral beliefs about privacy, piracy and pornography
along the information highway.
Procedures for Accomplishing These Objectives:
Lectures, Class Discussion, Student Reports
Student Requirements for Completion of Course:
A. Your final grade will be determined by a set of four out of five
in-class short answer examinations. Exams are worth 50% of the final grade,
are cumulative and are to be kept on file by the instructor. No make-ups.
B. You are required to submit critical responses to four sets of assigned
questions from the texts (see below.) These assignments are worth 50% of
the final grade. (Please keep copies.) Each assignment should be about
three typed pages in length. If the assignment is submitted on or before
the exam on the same topic, you may revise the assignment for a better
grade. Papers submitted the last meeting of the semester, of course, cannot
be revised.
C. You may submit an analytic paper (approximately 2500 words) discussing
in greater detail an issue covered in class or a topic directly related
to class discussion. Click
here for useful research sites. Papers should be typed and should include
appropriate bibliography and footnotes. (Topics must be approved by instructor;
paper may be substituted for one quiz of similar subject.)
D. Class participation will be considered especially in the case of
borderline grades. Unless otherwise informed, I will assume that any student
with three absences has dropped the class. Lateness or leaving the class
before the end of the hour counts as partial absence. Let me know in advance
if you must leave early or you will receive a full absence.
Required Texts:
(1) Computer Ethics, third edition [called "CE" below], Deborah G. Johnson, Prentice Hall, 2001; (2) Computers and Ethics in the Cyberage [called "CEC" below], D. Micah Hester and Paul J. Ford, Prentice Hall, 2001.
Weekly Reading Assignments:
1-2 Introduction
viii-x [CE].
2-4 Foundations 28-29 [CE]; 30-34 [CE]; 76-78 [CE]; 467-476 [CEC];
On
Morality.
4-7 Ethical Theory
Religious Authority
Egoism
Utilitarianism
36-43 [CE].
Moralism
43-47 [CE].
Ethical
Pragmatism
7-10 Piracy 153-167 [CE]; 292-306 [CEC]; 308-309 [CEC]. Napster.
10-13 Privacy and Hacking 118-135 [CE]; 310-328 [CEC]; 332-343 [CEC].
13-14 Cybergraphic Stalking 452-463 [CEC], Electronic
Freedom.
Writing Assignments:
Ethical Theory 53 [CE] #2; #3 and #6; #7 and #11; #13.
Piracy 167 [CE] #6; #10 with reference to CEC reading assignment.
Privacy 135 [CE] #5; #7; Describe and assess the conflict between Forester-Morrison
and Spafford in the CEC readings.
Pornography and Cybergraphic Stalking 452 [CEC] What is the connection
between pornography and cybergraphic stalking? Do you agree with the author's
conclusion?