|
Lecturer: Dr. Guy J. Cortesi [email protected] Office
Hours: by appointment
Course Description: This course
fulfills the writing and oral discourse requirements through
exploration of various topics related to information science for
information science majors. The course description states: "Development
of professional skills in information science. This course includes
development of student presentation skills including interviewing, web
development, the resume, and oral presentation skills."
Prerequisite(s): Information Science major.
Course Objectives:
Each week we will
research and discuss a specific topic related to information science. Within the
context of learning about these topics, we will also focus
on how the way we obtain information can affect the information
itself. This will be accomplished via lectures, individual and teams of students taking turns
researching topics, providing
readings and discussion questions and leading the class discussion.
Within the context of learning about these topics, we will also focus
on how the way we obtain information can affect the information itself.
In addition, this class will introduce:
how to write
a resume, cover letter, and memo and maximize the use of online tools
for job search / collaboration
how to participate in a job interview
how to
prepare and make presentations
how to produce a comprehensive and visually pleasing paper
how to
review a peer's paper
Topics we may cover in class include:
- collaboration
technologies
- "the flat
world" - leveling of the global playing field due to technology
- information
technology in education
- privacy and
national security
- security and
encryption
- online
communities
- shared data
and information
- copyright and
intellectual property
- online
pornography
- ethics
- artificial
intelligence
- information
technology and gender
- children on
the Internet
- access to
technology/the digital divide
- international
issues regarding the Internet
- online
charitable giving
- knowledge
management
Textbook
1. Sara Baase, A Gift of Fire: Social, Legal, and Ethical
Issues for Computing and the Internet, 3rd edition, ISBN: 0-13-601918-8.
The textbook is required and will be used in class.
Recommended:
Lynne Truss, Eats Shoots & Leaves: The Zero Tolerance Approach to
Punctuation
Friedman - The World is Flat: A Brief History of the 21st
Century - Further Updated and Expanded, 2007 edition (Version 3.0)
Strunk and White's The Elements of Style
Richard Fein, Cover Letters! Cover Letters! Cover Letters!, 2nd edition
Ron Fry, 101 Great Answers to the Toughest Interview Questions, 4th
edition
Ron Fry, 101 Great Resumes, revised edition
Becker and Becker, Powerful Presentation Skills
Cuckoo's Egg by Clifford Stoll
E-mail
It is important for all course students to have an
Internet-based e-mail account for this class. Students may use a
university account or their own personal account.
Course Website
This course has its own web site, containing assignments and
readings. Please consult this site for the latest information regarding
this course. It is located on the Internet at:
<https://www.albany.edu/~gc227838/ist499w>
The course also
uses Blackboard to manage submittals and assignments. Please
refer to your Blackboard account for these item.
Grading
Participation in class discussions and class prep (ie -
collaboration assignment) = 5 points
Assignment 1 - Resume and cover letter and LinkedIn site
update = 15
points
Assignment 2 - Collaboration research = 10 points
Assignment 3 - Re-do resume per LHH in-class discussions = 5
points
Exam = 20 points
Team presentation = 20 points
Final paper (15) & presentation (5) & peer review
comments (5) = 25 points
Points will be deducted for unexcused absences, lateness,
and early departures.
Grading Scale
A: 100-95 points A-: 94-90 points
B+: 89-87 points B: 84-86 points B-: 80-83 points
C+: 79-76 points C: 75-70 points
D: 69-60 points
F: 59 points and below
If you have any
questions regarding the assignments and exams, please
see me in person or send email directly to me.
Participation
Each student is expected to participate in every class.
Positive participation means speaking so everyone can hear; asking
appropriate questions; replying to questions, contributing ideas and
participating in discussion without dominating it; and helping
others. Positive participation creates a supportive learning
environment in which other students feel comfortable asking questions
and everyone contributes to the discussion.
Positive participation requires that students come prepared
for class. This means distilling the terminology and major
concepts of assigned readings; having points of personal interest in
mind for discussion; having questions in mind for ideas that are
unclear; knowing what the day’s topics will be and what assignments are
due; and bringing appropriate texts, materials, and tools for the day’s
class.
Written and Verbal Expression
Being able to communicate effectively with all sorts of people
is necessary for sustained success in managing information
systems. Students are expected to use proper spelling and
grammar and to adapt their speaking and writing to their
audience. Those who habitually use words, phrases, abbreviations
or acronyms that may be unfamiliar to the audience without proactively
explaining them in an understandable way, will have points deducted in
written assignments and in class participation as applicable.
Class Attendance/Lateness
There will be a
15 minute break during each class. Students are expected to attend
every scheduled class. Students are responsible for all
assignments, handouts, and work done in classes that are missed.
Academic Honesty
Students are expected to understand and abide by the
“Standards of Academy Integrity” outlined at:
https://www.albany.edu/undergraduate_bulletin/regulations.html
If you are found to violate academic integrity in any way, you
will get a 0 on the assignment and be reported to the Dean of
Undergraduate Studies. If you violate academic integrity twice during
the course, you will FAIL the entire course.
Class Schedule
The class meets on Monday from 4:15-7:05PM. The
schedule of classes as well as the other information in
this syllabus is subject to change. The latest, authoritative
version is
the current one posted this website. All necessary changes will be
announced in class. Exam dates will not be changed.
Date |
In-class Topic |
Homework Assignment
(due at start of class) |
1/25 |
Introduction, expectations, assignments, books
Resumes and cover letters
on-line business networking tools
Changing Workplace / Flat World / AGF Chapter 1
|
--
|
2/1
|
Resumes and cover letters
Interviewing for a Job
Peer Review
How to give a Presentation
|
Find
a job description you are interested in. Write a cover letter for that
job. Bring the description, cover letter, and resume into class for
peer view. Hard copy only
please. Read and refer to How
to Ensure Your Resume Produces Top Results and The
Most Important Ten Seconds of Your Job Search and class discussion
to build the best resume / cover letter.
Read:
Presentations
Read : AGF Chapter 1
|
2/8
|
Online Collaboration Tools and Technologies
Real-time vs Non real-time tools
Effective Communication Technologies and Methods
|
Assignment 1 - Due 2/8 - Submit the job
description,
and your final peer reviewed cover letter and resume via your
blackboard account. Create an account using LinkedIn and enter / update
all of your resume info. Locate me (Guy Cortesi) on LinkedIn and request a
connection. Add other connections as you see fit.
|
2/15 |
No class
|
|
2/22 |
Guest Speaker - Jeanne
Covert LHH
Resume overview
Networking /social platforms
Behavior Based Interviewing
Online Collaboration Tools and Technologies (student
led in-class demos)
Team finalization and signup - Team 1 determine topic and team leader.
|
Signup for a Team (1 of 6) on the course Blackboard
Website
Assignment 2 - Due 2/22 - Research Online Collaboration
Tools. Determine
the various categories of tools and determine the pros and cons of each
class and type. Enter this into and Excel spreadsheet as a weighted
decision / criteria matix, as discussed in class, and upload the file
to Blackboard. Be
prepared to do a 5 minute presentation on one of your favorite tools
for group and team collaboration. Do not plan to
use PowerPoint for this presentation, though you may use the projector
to login to demo certain tools.
Read AGF Ch 2
|
3/1 |
Topics:
Privacy, Freedom of Speech
Related links:
http://www.stopthespying.org/
Discuss team presentations
|
Assignment 3 - Due 3/1
Via Blackboard:
(1) Update and submit (upload) your resume based on in-class
discussions and presentation by guest speaker from LHH on 2/22.
(2) Submit a one or two paragraph summary of your final paper /
individual final presentation topic (MS Word format)
(3) Team leaders (only) one or two paragraph summary of
team presentation plans (MS Word format).
Read AGF Ch 3
|
3/8 |
Topic: Intellectual Property
Related links:
http://www.csmonitor.com/2007/1207/p09s01-coop.html
Team Presentation 1
|
Read AGF Ch 4
|
3/15 |
Exam (1/2 class) - the exam will cover in-class lectures
and the readings to date (all topics). The format of the exam
will be multiple choice, true/false and short answer.
Topic: Crime
Team Presentation 2
|
Read AGF Ch 5
|
3/22 |
Topic: Work
Team Presentations 3 & 4
|
Read AGF Ch 6
|
3/29
|
No Class
|
--
|
4/5
|
No Class
|
--
|
4/12 |
Topic: Evaluating and Controlling Technology
Team Presentation 5
|
Draft of your final paper due - 4/12. Bring into
class for peer
review. Paper copy only please.
Read AGF Ch 7
|
4/19 |
Topic: Errors, Failures, and Risk
Team Presentation 6
Individual Final Presentations
|
Do a peer review of someone's paper - Due 4/19. Return
your
comments to that student in class. The peer review should follow
the methods discussed in class and include a rubric.
Prepare your final presentation talk. You should be ready to give
it on on meeting day that includes 4/19, 4/26 and 5/3
Read AGF Ch 8
|
4/26 |
Individual Final Presentations (Continued)
Topic: Professional Ethics and Responsibilities
|
Incorporate peer review comments into final paper - Due
4/26.
|
5/3 |
Individual Final Presentations (Continued)
Last Class
|
Bring printed peer
reviewed copy of paper to class to turn in to the instructor. The
student doing the review will be graded on the quality and scope and
thoroughness of their review, based on the methods discussed in class.
This is worth 5 points. - Due 5/3.
Final paper also due 5/3. Hand in your final paper
ELECTRONICALLY via
Blackboard.
|
Team and Presentations:
Plan to spend about 45 minutes on your
presentation and discussion. You can rely on the book, but you will
also need to do additional research and preparation. You may present
your opinions, but you must also back it up with research. It needs to
be more than "This is what I think and that's how it is."
You will be graded on your presentation skills, your notes,
and how you lead the class discussion.
At the end of each chapter in AGF is a section for
assignments. You should use these as a basis for selecting your
presentation topics, though you may select other topics based on ideas
shared in class, you own interest and relavance to class discussions,
etc. Topics, presentation dates and groups / teams must be
approved in advance and scheduled. A list of suggested topics is
provided below.
Draft and Final Paper Assignment/Peer Review / Individual
Presentation Assignment:
You will select a topic relating to information science that
requires critical evaluation on your part and do in-depth research on
that topic to make an informed opinion and/or convincing argument for
or against something. It may or may not be a topic we cover in class,
but if we did cover it, you must examine a different angle or look more
in-depth at it than we did in class. The final paper must be 5 written
pages, with standard double-spaced formatting, not including the cover and thorough
reference list (Bibliography). The total paper including cover and
references should be 7 pages, with 1 page for cover and 1 page for
references.
You
will present your research to the class at the end of the semester. You
will need to turn in a draft of your paper. That week, one of your
classmates will peer review your paper (and you will review someone
else's paper) and turn it back to you. The peer review will consist of
positive and critical comments on the draft, as well as an attachment
with your notes and comments to the writer. You will also turn a copy
of your comments in to me to be graded. The final paper is due the last
day of class. In addition, students will present an oral 5 minute
summary of their topic to the class.
Grading Criteria for Final
Paper: (15 Points total) - (In addition, the peer review of another
students paper is worth 5 points. The presentation of the Final
Paper is worth 5 points, such that the Final Project, including the
Paper, Presentation and Peer review is worth 25 points total)
The proposal, including cover page, detailed writeup and
discussion as identified above, and a complete list of MLA formatted
references shall be 7 pages in length.
Overall presentation (Professional appearance, quality of
work, proper length, grammar, spelling, pg #’s, cover, double-spaced) 4
pts
Introduction (Provides reader with tech summary, background/executive
summary) 2 pts
Technical content and depth of coverage (Technical accuracy,
completeness) 4 pts
Policy issues (Addresses pros and cons of technology or issue, possible
security concerns, and addresses policy issues) 4 pts
References (Uses MLA format and provides adequate content,
includes at least 5 sources) 1 pt
Suggested topics for Final
Papers and Team Presentations:
Deep packet inspection.
What is it? What are its positive uses? What are its negative uses?
Give examples. Consider network security, censorship,
management of network traffic, privacy, and any other relevant areas.
Devices to assist people with disabilities.
Report on computer-based technologies that assist people with
disabilities. Consider blind people, deaf people, people who use
wheelchairs, people with limited use of their hands and arms, etc.
Describe some of the new tools and their impact. Discuss issues such
as cost, any problems with these devices, etc. (Focus on newer
developments, e.g., devices not mentioned in the textbook.)
Identification and biometrics.
A company sells an identification chip that is implanted under a
person's
skin. About the size of a grain of rice, it contains personal
information
and emits a radio signal that identifies the person. Give examples of
where the chips is currently used. Discuss beneficial uses, potential
problems and abuses, and appropriate guidelines for use of such a chip
and other identification technologies, including various biometrics.
Telemedicine.
Describe applications, from remote consultation to remote surgery.
Benefits, possible problem areas (privacy, errors, loss of personalized
care).
Health information on the Web.
Research and report on Web-based health information sites, including
such issues as benefits, reliability of the information, privacy
protections, techniques being developed to rate or accredit sites,
impact on medical care. Patients of some healthcare providers can
access their own records online. Describe an example. How does it
affect medical care?
Privacy on the Web.
What's happening now? Recent abuses and improvements. Describe and
evaluate Web site policies and technical and policy privacy protections
provided by the market, and current proposals for government
regulations.
Privacy for organizations and businesses.
All our discussion of privacy concerns privacy for people. There have
been incidents in which sensitive information that organizations and
businesses must provide to government agencies has been made public,
intentionally, accidentally, or by leaks. Release of information about
fund-raising, sales plans, pricing, members, or customers might aid
competitors. Release of information about manufacture of, storage of,
and security for certain chemicals could aid terrorists. Report on
some cases and discuss reasonable extensions of principles about
privacy for organizations and businesses.
Personal data privacy regulations in other countries.
Report on personal data privacy regulations, Web site privacy policies,
and law enforcement access to personal data in one or more countries,
e.g. the European Union.
Computers in law enforcement.
Issues include benefits to crime fighting, invasion of privacy,
problems caused for innocent people because of errors. Describe cases
where a computer system has been very helpful in catching a criminal
or vindicating an innocent person, and describe cases where a computer
system has caused serious problems. An activity for this project could
include a ride-along in a police car. (A few students did this in the
past and found it very instructive.) Another possible activity is to
interview someone who runs or supervises the use of local law
enforcement
computer systems. What databases do they access? How do they prevent
unauthorized access?
Computers in the legal/justice system.
Describe systems in use, from legal databases to artificial intelligence
programs that help judges determine sentences. Consider the possibility
of AI systems making judgments in some legal cases. Describe and
evaluate
pros and cons.
Technological responses to terrorism.
Describe and evaluate some of the computer-based technologies
implemented
or expanded after Sept. 11, 2001. Consider effectiveness, cost, impact
on daily life, air travel, risks, etc., and arguments related to privacy
and civil liberties.
Children on the Internet.
There are several problem areas: availability of material not
appropriate
for children, contact with people who seek to abuse children, and
privacy
risks from game sites that ask children for extensive personal and
family information (for marketing purposes). How serious are these
problems? What is being done about them? Evaluate various solutions.
Do benefits for children on the Net outweigh risks? Can we arrange to
have the benefits without the risks?
The Global Economy.
What are the roles and impacts of computers and communications
technology in the increase of trans-border economic activity (e.g.,
eBay as a global garage sale; customer service workers in other
countries handling U.S. consumer calls; databases to track the origin
of a cow with Mad Cow Disease; etc.)? What are the benefits? What are
the problems? Is this aspect of increased globalization a good thing
for people in the U.S., for people in other countries, for humanity in
general?
Automated systems.
Study progress, safety, and social issues related to an automated system
such as automated highways and self-driving vehicles.
Safety-critical applications.
Find a local application to study, or study the Air Traffic Control
system, systems to prevent train crashes, a particular area of medical
devices, or other similar topic. Describe systems in use, discuss
benefits and risks.
Use of computer and Web technology by restaurants.
Investigate and discuss issues such as customer service, impact on
employment, food safety, ambiance. Visit a restaurant with self-service
ordering terminals. Some fast food restaurants use robotic devices
for food preparation; report on one. Interview a waiter or restaurant
manager. (This could be part of a paper that looks at the impact of
computer automation in two or three industries or consumer services.)
Spam.
Describe and evaluate technical solutions, current legislation and
regulation, and significant proposed legislation. Some people propose
that the federal government create a "Do not spam" list, like the "DO
not call" list for telemarketers. Discuss privacy problems that could
occur with implementation of such a list. Discuss the roles of technical
and legislative solutions for spam. Consider the relevance of freedom
of speech.
Censorship of the Internet.
Some aspect not covered in the text, or study some issue in more detail.
Information warfare.
Will the next wars be fought without bombs? Will computer networks and
computer-controlled infrastructure be the targets of military hackers?
What is happening now? What kind of defenses are possible?
Recent copyright battles for music and movies.
Report on several recent strategies used by the entertainment industries
(legal, technological, and business) to prevent unauthorized copying.
Evaluate the effectiveness and ethics of the methods. Describe current
controversies.
Free software and open source software.
What's happening with "free" software and open-source software now?
What is their impact? What are the implications for consumers? For big
companies like Microsoft?
Identity theft.
What is the current state of the problem? Describe relevant laws. How
have consumers and businesses changed behavior in response to Identity
Theft? What technical solutions have developed?
Hacktivism.
Report on specific incidents or organizations engaged in hacktivism.
Compare to civil disobedience and to other kinds of hacking.
Are Web issues really new?
Choose two other technologies or innovations, such as radio, telegraph,
railroads, or electricity, and find out what ethical, social, and legal
issues and controversies arose about them. Compare the problems and
issues to current problems and issues about the Web. What solutions
developed? How well do those solutions fit the Web?
Computers and the environment.
How are computers used by nature researchers and organizations. Describe
applications that help protect the environment. Describe aspects of
computers that cause environmental problems. What do environmentalists
think of computers?
Political activism on the Net in the U.S. (or other politically free
country).
How has the Internet helped or hurt political groups outside the
mainstream? How is it used by major political parties and candidates?
What is the impact? How do/should current regulations about political
campaigns affect individuals and small organizations that set up Web
pages to support/oppose candidates and issues?
Politial organizing in unfree countries.
Choose one country or a few countries that restrict political freedom.
Describe how people use social networking sites and other Internet
technologies to organize political events, strikes, protests, boycotts,
etc. How have these techniques affected the politics of the country?
How have the governments responded? What do these experiences suggest
for the future of political freedom and democracy?
Electronic Voting and Internet Voting.
The U.S. and some other countries have experimented with voting on the
Internet or using electronic voting machines. How successful were the
first experiments? Will most political elections be held on the Internet
in the future? Discuss the problems of maintaining secret ballots,
preventing election fraud, and providing for recounts (for both
electronic
voting machines and Internet voting). What other issues are relevant?
How are the states (and other nations) handling these issues?
Violence in video/computer games.
What is the impact on children? How does it differ from television?
Interview people who write and publish computer games to find out their
policies and views about violent games.
Use of the Web in schools.
Are students being taught to use the Web effectively, wisely, and
safely?
Distance learning.
What are the common uses? What will be the impact on universities? On
adult education? Is cheating a problem?
Monitoring of employees' Web use and e-mail.
What policies are employers using? Perhaps study a few large businesses
in your area. Evaluate policies for different kinds of employers (e.g.,
for your university, covering students, faculty, and staff, and for a
software company in a highly competitive business).
Cyberspace communities.
What makes a "community"? How do cyberspace communities handle
decision making, dealing with troublesome members, etc.? Find one
community to study in depth, preferably one that you are a member of
or have a special interest in. (Please respect the community's privacy
guidelines and ask permission if quoting members.)
Gender or ethnic issues.
The _Journal of Women and Minorities in Science and Engineering_ might
have some useful articles for background and ideas for specific
projects.
There have been several studies of differences in the way men and women
use computers. Compare Web sites aimed at women or at specific ethnic
minority audiences with the Web in general.
Computing and network access in other countries.
For example, how are computers used in rural, poor areas of Africa?
Choose one country to study in depth or compare a few.
Science fiction and prediction.
Find several science fiction stories published at least 30 years ago
that are set in the present time or near future and describe computer
and communications technologies. Report on how closely their view of
the technology corresponds to what is actually available. What social
benefits and problems did they anticipate?
What will the world be like 50 years from now?
How will electronic communications and commerce affect the power of
centralized governments? Everyday life? What will happen as computers
are connected to the human body? Will human intelligence be of less
value in the future? Several experts have written books addressing
these issues. You could read two or three and evaluate their
predictions.
Updated 4/9/10 gjc
|