1 / 30

CS 349: Contemporary Issues in CS CS 301k: Foundations of Logical Thought

CS 349: Contemporary Issues in CS CS 301k: Foundations of Logical Thought. Elaine Rich Alan Cline. Free Rice. http://www.cs.utexas.edu/users/ear/cs349/FreeRice.html. Contemporary Issues in CS. http://www.cs.utexas.edu/users/ear/cs349/. Professional Ethics.

varden
Download Presentation

CS 349: Contemporary Issues in CS CS 301k: Foundations of Logical Thought

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 349: Contemporary Issues in CSCS 301k: Foundations of Logical Thought Elaine Rich Alan Cline

  2. Free Rice http://www.cs.utexas.edu/users/ear/cs349/FreeRice.html

  3. Contemporary Issues in CS http://www.cs.utexas.edu/users/ear/cs349/

  4. Professional Ethics Your first job after graduation is system administrator for a 200 person privately held manufacturing company. The president/owner sends this message to the employees: “I want to encourage each of you to make comments to me about any facet of our operation you care to. Your response should be made through our anonymizer program so that your identity will not be disclosed” The president/owner finds one response saying: “This company sucks. The only way I find to retaliate for the way I have been treated is sabotage. Every tenth part I turn out is defective.” The president/owner insists that you examine the computer usage records to determine the identity of the alleged saboteur. What should you do?

  5. iClickers http://www1.iclicker.com/

  6. Vacuums and Muddles • Conceptual muddles • Policy vacuums

  7. Vacuums and Muddles • Computer programs become economically significant assets. • Policy vacuum: How should this intellectual property be protected? • Conceptual muddle: What is a program? • Is it text? • Is it an invention? • Is it mathematics?

  8. Vacuums and Muddles • Email • Policy vacuum: Should the privacy of email communication be protected? • Conceptual muddle: What is email? Is it more like a: • letter, or a • postcard?

  9. Vacuums and Muddles • E Cigs

  10. Vacuums and Muddles • E Cigs

  11. More on E Cigs

  12. Vacuums and Muddles • E Cigs • Policy vacuum: How should they be regulated? Can they advertise? Who can by them? • Conceptual muddle: What are they: • Cigarettes • Drug delivery vehicles • Something else

  13. Vacuums and Muddles No Yes ???? Now Then

  14. What Do They Have the Right to Do? Warrant-less demands for cell location data: Is raw location data protected by your right to privacy in the same way that the content of what you say on your phone is? • Conceptual muddle: what is cell location? • Policy vacuum: Can the police get it without a warrant?

  15. Vacuums and Muddles • Are ISPs common carriers? • Provide equal service to everyone. • Are not responsible for content.

  16. Vacuums and Muddles • The police confiscate your laptop, hoping to find incriminating evidence. But you’ve encrypted it. • Policy vacuum: Can the police force you to decrypt it? • Conceptual muddle: • Does the 5th Amendment protect you from being forced to “incriminate yourself”? • Or is this the same as the requirement that, if the police show up at your house with a warrant, you must unlock the door?

  17. Protecting Sources • Policy vacuum: Must a blogger reveal sources? • Conceptual muddle: http://www.wired.com/threatlevel/2010/04/too-much-media/ http://newjerseylawreview.blogspot.com/2011/06/blogger-must-reveal-sources-says-nj.html

  18. Cyberwarfare • Jus ad bellum: • Article 2(4) of the UN Charter prohibits every nation from using “the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.” . • Conceptual muddle: What constitutes use of force: • Launching a Trojan horse that disrupts military communication? • Hacking a billboard to display porn to disrupt traffic? • Hacking a C&C center so it attacks its own population?

  19. Example Essays • What I Have Lived For • What’s Right? • Income Disparity in the Face of Labor Displacement by Technology or What Happens When/If There Aren’t Any Jobs Left for People?

  20. The Video Project http://www.cs.utexas.edu/users/ear/cs349/VideosAsExamples/

  21. And the Oscar Goes to …

  22. CS 301k – Foundations of Logical Thought http://www.cs.utexas.edu/users/ear/cs301k/

  23. FREGE http://www.learnlogiconline.org/ https://quest.cns.utexas.edu/instructor/courses/list

  24. The Students’ Background? • Boolean logic • Venn diagrams • Formal proofs • Modular arithmetic • Binary numbers

  25. Truth Table App http://www.truthtables.org/ www.truthtables.org/#/true/!(p&(q|r))=((p&q)|(p&r))

  26. Querium Interface

  27. Querium Interface

  28. Sense or Nonsense

  29. Back to Free Rice • Minesweeper for Mines • Crowdsourcing to Save Biodiversity • Laundry Basket for Homelessness • The End Hunger Ad Network • RFIDs End Food Waste

More Related