Course Description
Computing and information science is relevant to many aspects of our lives, from explorations in science and medicine, the arts, to commerce and entertainment. This course explores some ideas and technologies of computing and information science as well as their role in society from the ethical, legal, historical, and cultural perspectives. Students are introduced to the user-centered development life cycle for web site design with a focus on critique and usability testing. Students are exposed to some of the underpinnings of modern artificial intelligence and they learn fundamental computer programming concepts through the manipulation of digital media. Through discussion, debate, and writing, this course also explores the rewards, challenges, and opportunities presented by the rapid evolution and adoption of computing and information technologies.
Times and Places
The typical meeting locations are given below. See the detailed schedule for the actual locations and meeting times for specific days.
- 9:00-10:15am and 10:30-11:45am
- 403 Phillips Hall
- 1:15-2:45pm and 3:00-4:30pm
- ACCEL Blue Room (Carpenter Hall)
Schedule
All homework and tests must be completed at their scheduled time unless your request for special accommodation has been approved before the deadline. Any request for test-taking accommodation must be made during the first week of the course. Homework is due at 9pm unless otherwise noted.
- AI
- artificial intelligence
- PROG
- computer programming
- DIS
- discussion--information and culture
- HCI
- human-computer interaction
Sunday, 17 July
- 3:00-4:00pm (Plant Sci 143)
- Convocation
Monday, 18 July
- 9:00-10:15 (PH 403)
- What is CIS? Course mechanics
- 10:30-11:45 (PH 403)
- Social informatics, ethics & law
- 1:15-2:15
- Time for registration/supplies
- 2:30-3:45 (Uris Aud)
- College admissions workshop
- Assigned
- Reading 1
Tuesday, 19 July
- 9:00-10:15 (PH 403)
- Information architecture
- 10:30-11:45 (PH 403)
- Web design--navigation
- 1:15-2:45 (Mann 102)
- Human-Computer Interaction
- 3:00-4:30 (Mann 112)
- Usability test plan
- Due
- HCI Ex 1
- Reading 1
- Assigned
- HCI Ex 1
- HCI Ex 2
Wednesday, 20 July
- 9:00-10:15 (ACCEL)
- Explore Matlab (Lab files)
- 10:30-11:45 (ACCEL)
- Explore Piazzza and CMS
- 1:15-2:45 (UP 109)
- Ethical frameworks & copyright
- 7:30 (Kennedy Aud)
- Guest lecture by Jon Kleinberg
- Due
- HCI Ex 2
- Assigned
- Reading 2
Thursday, 21 July
- 9:00-10:15 (ACCEL)
- Branching
- 10:30-11:45 (ACCEL)
- for-loop (Example files)
- 1:15-2:45 (UP 109)
- Usability test
- 3:00-4:30 (UP 109)
- Usability test
- Due
- Reading 2
- Assigned
- Prog Ex 1
- HCI Ex 3
Friday, 22 July
- 9:00-10:15 (PH 403)
- Copyright & Privacy
- 10:30-11:45 (PH 403)
- Copyright & Privacy
- Due
- HCI Ex 3
- Assigned
- Reading 3
Sunday, 24 July
- Due
- Reading 3
Monday, 25 July
- 9:00-10:15 (PH 403)
- Artificial Intelligence
- 10:30-11:45 (PH 403)
- Cybernetics & automation
- 1:15-2:45 (UP 109)
- Social network
- 3:00-4:30
- Study/work period
- Due
- Prog Ex 1
- Assigned
- Reading 4
Tuesday, 26 July
- 9:00-10:15 (PH 403)
- Debate/Project Topics Overview
- 10:30-11:45 (PH 403)
- Test 1
- 1:15-2:45 (ACCEL)
- Functions, nested loops
- 3:00-4:30 (ACCEL)
- Exercise, Example files
- Assigned
- Term paper and final project
- Prog Ex 2
Wednesday, 27 July
- 9:00-10:15 (PH 403)
- Natural language processing
- 10:30-11:45 (PH 403)
- machine translation
- 1:15-2:45 (ACCEL)
- NACLO problems, translation
- 3:00-4:30 (ACCEL)
- Social network lab (assignment, data)
- Due
- Social network lab
- Assigned
- AI lab 1
- Social network lab
Thursday, 28 July
- 9:00-10:15 (ACCEL)
- Library research
- 10:30-11:45 (PH 403)
- 3-d modeling
- 1:15-2:30 (ACCEL)
- Vector
- 2:45-4:30 (MVR 151)
- 3-d modeling: body scanning
- Due
- Prog Ex 2
- Reading 4
- Assigned
- Prog Ex 3
Friday, 29 July
- 9:00-10:00 (PH 403)
- History of digital age & free speech
- 10:15-11:45 (Johnson Museum)
- Information, computing, & art
- Due
- AI lab 1
- Final Project mini proposal
Monday, 1 August
- 9:00-10:15 (PH 403)
- Information Retrieval (IR)
- 10:30-11:45 (PH 403)
- Web search, IR Lab
- 1:15-2:45 (ACCEL)
- Exercise (Example files)
- 3:00-4:30
- Study/work period
- Due
- AI lab 2
- Prog Ex 3
- Assigned
- AI lab 2
Tuesday, 2 August
- 9:00-10:15 (PH 403)
- Machine learning
- 10:30-11:45 (PH 403)
- Spam classifier / Na‹ve Bayes
- 1:15-2:00 (Malott Bache Aud)
- Debate preparation
- 2:00-4:30 (Malott Bache Aud)
- Debate (topics and teams)
- Due
- Draft paper due at 1pm
Wednesday, 3 August
- 9:00-10:15
- Study/work period
- 10:30-11:45 (PH 403)
- Test 2
- 1:15-2:45 (ACCEL)
- Media computation (sound & image)
- 3:00-4:30 (ACCEL)
- Media computation (Lab 5, Example files)
- Assigned
- Prog Ex 4
Thursday, 4 August
- 9:00-10:15 (Stimpson lab)
- Game with a purpose
- 10:30-11:45 (PH 403)
- Video games & learning (discussion)
- 1:15-2:45 (ACCEL)
- Exercise
- 3:00-4:30
- Study/work period
- Due
- Prog Ex 4
Friday, 5 August
- 9:00-10:15 (PH 403)
- Student presentations
- 10:30-11:45 (PH 403)
- Student presentations
- Due
- Final paper due at 5pm
Readings
Consult the schedule for reading due dates.
You may find it useful to read the abstract and/or introduction carefully. This will give you a sense of the themes and the arguments that the author(s) intends to make. Academic conclusions tend to list limitations of the research and suggest further lines of inquiry. The key for you, beyond understanding the intensions of the author(s), is to develop and clearly articulate your own position/opinion/response to the reading. It is not enough to simply agree or disagree - offer theoretical and/or empiracal justification! The reading questions may well help guide your understanding and thinking - you do not have to answer them directly.
You can respond to the reading questions individually or as a unified essay. The length should be two paragraphs (although less or more is fine as long as you answer them with sufficient clarity and completeness. Try as much as possible to provide concrete examples that are not from the reading.
Rationale for distinguishing among grades
Reading 1
- Textbook: The Internet and Ethical Values. pp 1-25.
- Textbook: Case study: Yahoo. pp
46-4850-54. - Lessig (2001): The Internet Under Siege. Foreign Policy, Nov/Dec 2001.
- Sharma (1998): Down By Law: Responses and Effects of Sampling Restrictions on Rap. PoLAR Vol. 22(1).
Reading Questions:
- What does the "iron cage" refer to? Do you think it supports technological or social determinism? Why or why not?
- What is the difference between negative and positive freedoms / liberty?
- What are natural laws? Do they favor increased government regulation of the internet?
- What does the categorical imperative refer to in Kant's moral philosophy? Can you apply the categorical imperative to the use of cell phones in public spaces? Why or why not?
- Does Lessig employ consequentialist or deontological justifications for allowing the internet to operate as a creative commons?
- Where do you stand on the Yahoo case study issue?
- The textbook has further prompts for this section on p 24.
Reading 2
- Textbook: Regulating Internet Privacy. pp 149-190.
- Mayo et. al. (2009): Video games: A Route to Large-Scale STEM Education? Science New Series, Vol. 323, pp 79-82.
Reading Questions
- How would you define privacy? Is it a moral concept, legal construct, governmental policy, a set of organizational principles or some combination of them all? If so explain how and why privacy works in cyberspace AND in your daily life by providing an example. Is privacy a universal right in the Kantian sense or a something that is culturally relative?
- What approach did the Direct Marketing Association want the U.S. government to adopt? What was the basis of their argument? Do you agree with their position? If so, what is the basis for your agreement. If you disagree, explain why.
- How can self-regulation of privacy work? Can it be more efficient than relying on legal protections or governmental/industry/university policies?
- What is HIPPA? Why was it created? Do you think it is too stringent and increases the difficulty of obtaining personal information and sharing it with others (like family members)?
- How much privacy protection should companies provide for their employees?
- List two major differences between the U.S. and the European Union (EU) in devising and enforcing privacy laws. Which do you prefer? Why? Should there be a global privacy protection that is similar to a universal human right?
Reading 3
- Wiener (1960): Some Moral and Technical Consequences of Automation. Science, New Series,Vol. 131. no. 3410, pp. 1355 - 1358.
- Samuel (1960): Some Moral and Technical Consequences of Automation: A Refutation. Science New Series, Vol. 132. no. 3429, pp. 741 - 742. This article is available via CMS; click on Reading 3 in CMS.
- Bynum: Norbert Wiener's Vision: The Impact of 'The Automatic Age' on our Moral Lives. 2005.
Reading Questions
- The article by Prof. Terrell Ward Bynum analyzes Norbert Wiener's views on the positive and negative aspects of the "automatic age." What is cybernetics? Is cybernetics a Utopian idea? Do you think the development of "information and communication ethics" has any impact on Lessig's vision of a creative commons?
- Why was Norbert Wiener so worried about divergences in time scales in his article entitled,"Some Moral and Technical Consequences of Automation." Do you think this is as much of a problem today as he thought?
- What kind of game did Princeton mathematician John von Neumann event/discover? How was it applied by the military? Is it still being used today? Can you think of any moral and political problems that such gaming can produce?
- Wiener claims that "The human brain is a far more efficient control apparatus than is the intelligent machine when we come to the higher areas of logic." Do you agree? if so, what evidence is there? If you disagree, provide some examples of how control can lead to very dangerous problems?
- Arthur L. Samuel worked as a researcher at IBM when he responded to Wiener's article on automation. Samuel claimed that Wiener was exaggerating about the power of machines. Do you think Samuel's argument is convincing? Why or why not?
Reading 4
- Textbook: Free Speech and Content Controls in Cyberspace. pp 57-97
- Bush: As We May Think. The Atlantic Online, 1945.
Reading Questions
- At the beginning of Section 1 in "As We May Think," Vannevar Bush makes the following claim:
"Of what lasting benefit has man's use of science and of the new instruments which his research brought into existence? First, they have increased his control of his material environment. They have improved his food, his clothing, hid shelter; they have increased his security and released him partly from the bondage of bare existence. They have given him increasing knowledge of his own biological processes so that he has had a progressive freedom from disease and an increasing span of life. They are illuminating the interactions of his physiological and psychological Technology policy functions, giving the promise of improved mental health."
Imagine you have been appointed Director of Science, Technology and Humanitarian Policy by President Obama. Your task in the first part of this writing assignment is to write a short memo In your memo describe vision of what you hope to achieve, your funding priorities; the governmental agencies that will be needed to assist you; the people and groups you will form alliances with in order to build public support for your plans; and the time/schedule for completion of the first phase of your project. Defend your choices using a mixture of ethical theories and empirical facts. For example, if you want to target funding to help people in Africa with new strains of Tuberculosis (TB) who are migrating to the U.S., then explain how this initiative will help the U.S., its global image and help reduce a devastating disease by increasing funding at university-based science and engineering labs (like Cornell). Finally, compare how your vision of the world compares with Vannevar Bush’s ideas 64 years later. (This should take about 1 page) - Do bloggers deserve the same privileges to protect their sources as do regular journalists? (Read about the dilemmas on page 76 in Spinello).
Materials
Books
- Required textbook: Cyberethics: Morality and Law in Cyberspace
- Optional material: a portable memory device (e.g., a memory stick)
Class Files
Please note: lecture notes are linked to in the above schedule.
Programming Lab 1: Exploring Matlab
Programming Lab 2: Branching and for-loop
Programming Lab 3: Loops and Functions
Programming Lab 4: Vectors
Programming Lab 5: Media Computation (Vector & Matrices)
Grades
You must adhere to the Code of Academic Integrity for all work.
Items that count towards your course grade include homework, lab exercises, two tests, a term paper (including a debate), a final presentation, and participation in discussion. Given the broad range of topics covered in the course, "homework" appears in different forms, including reading, pre-discussion questions, post-discussion notes, programming assignments, problem sets, and writing assignments.
- Participation
- 10%
- Lab exercises and homework
- 45%
- Tests (2)
- 20%
- Term paper and debate
- 20%
- Final presentation
- 5%
Office Hours
Office Hour is time outside of scheduled classes during which you can get help on course material. The instructor or a teaching assistant (TA) will be able to answer your questions. Just "walk in" - no appointment is necessary. Some office hours will be in the Engineering Library after class and some will be in the RPCC computer lab in the evening.
- Mondays 5-6pm
- Albert in Engineering Library
- Tuesdays 7-8pm
- Jijie in RPCC Computer Lab
- Wednesdays 5-6pm
- Albert in Engineering Library
- Wednesdays 7-8pm
- Dr. Fan in RPCC Computer Lab
- Thursdays 5-6pm
- Shion in Engineering Library
- Fridays 12-1pm
- Jijie in Engineering Library
Academic Integrity
Simply put, academic integrity is about respecting yourself and respecting others. You respect yourself by submitting work completed through your own effort; you respect others by acknowledging contribution from others when such external contribution is allowed, e.g., for group projects. You can always seek help from the course staff, but when your individual effort is required you may neither seek nor accept help from others. You must read the Code of Academic Integrity on the course website. Ignorance of the Code is not an acceptable excuse.
You can view Cornell's full Code of Academic Integrity for more details.