CSCI 328--Ethical Issues in Computer Science

    College of the Holy Cross, Fall 2013

    Home | | Syllabus | | Assignments | | Lecture Notes

    Assignment 5

    Due: Friday, September 27, in class


    Reading:

    "Computer Ethics", Chapter 4
    "Readings in CyberEthics", Chapter 4, pp 397-417, 471-487


    Response Questions

    Write a short answer (about 1/2 page double spaced per question) to each of the following (from chapter 4 of Johnson and chapter 4 of "Readings in CyberEthics")

    1) What are two arguments that can be made for why we shouldn't worry about privacy? How can each of the two be countered?

    2) What is data mining and why has it been considered by many privacy advocates to be an especially serious threat to individual privacy?

    3) How, according to Joseph Fulda, can at least some privacy problems associated with data-mining practices in the United States be resolved through a theory of privacy rights based on tort law?


    Home | | Syllabus | | Assignments | | Lecture Notes


    Constance Royden--croyden@mathcs.holycross.edu
    Computer Science 328--Ethical Issues in Computer Science
    Last Modified: September 22, 2013
    Page Expires: September 4, 2014