Using information technology to integrate social and ethical issues into the computer science and information systems curriculum: report of the ITiCSE '97 working group on social and ethical issues in computing curricula

This report presents the results of a collaborative working group activity focusing on the use of information technology (IT) to integrate social and ethical issues within computer science or information systems courses. The report provides an organizational approach for classifying exercises, based on the issue each one addresses and the course or courses in which it may fit. The exercises in this report are classified by the information technology to be used and the course or courses addressed by the exercise. Ten sample exercises are provided, each given in a recommended standardized format.

[1]  J. R. G. Wood,et al.  How we profess: the ethical systems analyst , 1996, CACM.

[2]  Diana D Juettner,et al.  Information Technology: The Conflict Between Freedom of Information laws and the Right to Privacy , 1994 .

[3]  B. Shneiderman Human values and the future of technology: a declaration of empowerment , 1990, CQL '90.

[4]  Richard A. Spinello Ethical Aspects of Information Technology , 1994 .

[5]  Edward A. Cavazos,et al.  Cyberspace and the Law: Your Rights and Duties in the On-Line World, Edward Cavazos and Gavino Morin. 1994. MIT Press, Cambridge, MA. 220 pages. ISBN: 0-262-53123-2. $19.95 , 1994 .

[6]  R. Kling,et al.  Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .

[7]  B. Shneiderman,et al.  Social impact statements: engaging public participation in information technology design , 1996, CQL '96.

[8]  Stacey L. Edgar Morality and Machines: Perspectives on Computer Ethics , 1997 .

[9]  Ina Wagner,et al.  A web of fuzzy problems: confronting the ethical issues , 1993, CACM.

[10]  Judith A. Perrolle,et al.  Computers and social change: information, property, and power , 1987 .

[11]  Richard G. Epstein The case of the killer robot , 1997 .

[12]  Donald Gotterbarn,et al.  Ethics activities in computer science courses , 1996, CSOC.

[13]  Dorothy E. Denning Clipper Chip Will Reinforce Privacy , 1996, Computerization and Controversy, 2nd Ed..

[14]  Tracy Hall,et al.  Software Project Management Ethics , 1997 .

[15]  Norman E. Gibbs,et al.  A model curriculum for a liberal arts degree in computer science , 1986, CACM.

[16]  Donald Gotterbarn,et al.  Ethics activities in computer science courses: goals and issues , 1997, CSOC.

[17]  G.F. McLean Integrating ethics and design , 1993, IEEE Technology and Society Magazine.

[18]  Peter J. Denning,et al.  Computing as a discipline , 1989, Computer.

[19]  Gregg C. Vanderheiden Curbcuts and Computers: Providing Access to Computers and Information Systems for Disabled Individuals. , 1983 .

[20]  Thomas A. Finholt,et al.  The mystery of RSI. , 1988, The American psychologist.

[21]  Terry Winograd,et al.  Understanding computers and cognition , 1986 .

[22]  K. Kraemer,et al.  Datawars: The Politics of Modeling in Federal Policymaking , 1987 .

[23]  Keith Miller,et al.  Integrating Computer Ethics into the Computer Science Curriculum , 1988, Comput. Sci. Educ..

[24]  Chuck Huff,et al.  Practical guidance for teaching the social impact statement (SIS) , 1996, CQL '96.

[25]  Keith W. Miller,et al.  Implementing a tenth strand in the CS curriculum , 1996, CACM.

[26]  Ben Shneiderman,et al.  Designing The User Interface , 2013 .

[27]  Thomas A. Finholt,et al.  Social Issues in Computing: Putting Computing in Its Place , 1994 .

[28]  Duncan Langford,et al.  Practical Computer Ethics , 1996 .

[29]  Richard S. Rosenberg,et al.  The Social Impact of Computers , 1992 .

[30]  J. Weizenbaum Computer Power And Human Reason: From Judgement To Calculation , 1978 .

[31]  David Lorge Parnas,et al.  Computers in weapons: the limits of confidence , 1994 .

[32]  Keith W. Miller,et al.  How good is good enough?: an ethical analysis of software construction and use , 1994, CACM.

[33]  Cheris Kramarae Technology and Women's Voices: Keeping in Touch , 1988 .

[34]  Starr Roxanne Hiltz,et al.  Network Nation: Human Communication Via Computer , 1979 .

[35]  Diane Whitehouse,et al.  Computers and society , 1993 .

[36]  William R. Swinyard,et al.  The morality of software piracy: A cross-cultural analysis , 1990 .

[37]  Jonathan P. Allen Groupware and social reality , 1992, CSOC.

[38]  Keith W. Miller,et al.  Paramedic ethics for computer professionals , 1992, J. Syst. Softw..

[39]  Batya Friedman,et al.  Educating computer scientists: linking the social and the technical , 1994, CACM.

[40]  Rob Kling,et al.  Organizational Analysis in Computer Science , 1993, Inf. Soc..

[41]  Alan M. Lesgold,et al.  Competition in individualized CAI , 1994 .

[42]  Deborah G. Johnson Computer Ethics , 1985 .

[43]  Lucy Suchman Plans and situated actions: the problem of human-machine communication , 1987 .

[44]  Jeffrey Rothfeder Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret , 1992 .

[45]  Lee Sproull,et al.  Computers, Networks and Work. , 1991 .

[46]  P Adler,et al.  Employee privacy: legal and research developments and implications for personnel administration. , 1985, Sloan management review.

[47]  Kevin W. Bowyer Ethics and Computing: Living Responsibly in a Computerized World , 1995 .

[48]  Batya Friedman,et al.  Computing and social responsibility: a collection of course syllabi , 1990 .

[49]  Mary J. Granger,et al.  Creating an Ethical Awareness using the Internet , 1996, J. Inf. Syst. Educ..

[50]  David B. Paradice,et al.  Ethical Issues in Information Systems , 1991 .

[51]  N. Wiener The Human Use of Human Beings , 1950 .

[52]  R. Kraut Predicting the use of technology: the case of telework , 1994 .

[53]  Chuck Huff,et al.  Computing consequences: a framework for teaching ethical computing , 1995, CACM.