University at Albany, State University of New York



IST499W Home



IST499W Senior Seminar - Syllabus Spring 2010

 

       

Lecturer: Dr. Guy J. Cortesi [email protected] Office Hours: by appointment

Course Description:  This course fulfills the writing and oral discourse requirements through exploration of various topics related to information science for information science majors. The course description states: "Development of professional skills in information science. This course includes development of student presentation skills including interviewing, web development, the resume, and oral presentation skills."

Prerequisite(s): Information Science major.

Course Objectives:

Each week we will research and discuss a specific topic related to information science. Within the context of learning about these topics, we will also focus on how the way we obtain information can affect the information itself.  This will be accomplished via lectures, individual and teams of students taking turns researching topics, providing readings and discussion questions and leading the class discussion. Within the context of learning about these topics, we will also focus on how the way we obtain information can affect the information itself.

In addition, this class will introduce:

how to write a resume, cover letter, and memo and maximize the use of online tools for job search / collaboration
how to participate in a job interview
how to prepare and make presentations
how to produce a comprehensive and visually pleasing paper
how to review a peer's paper

Topics we may cover in class include:
  • collaboration technologies
  • "the flat world" - leveling of the global playing field due to technology
  • information technology in education
  • privacy and national security
  • security and encryption
  • online communities
  • shared data and information
  • copyright and intellectual property
  • online pornography
  • ethics
  • artificial intelligence
  • information technology and gender
  • children on the Internet
  • access to technology/the digital divide
  • international issues regarding the Internet
  • online charitable giving
  • knowledge management

Textbook

1. Sara Baase, A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd edition, ISBN: 0-13-601918-8.

The textbook is required and will be used in class.

Recommended:

Lynne Truss, Eats Shoots & Leaves: The Zero Tolerance Approach to Punctuation

Friedman - The World is Flat: A Brief History of the 21st Century - Further Updated and Expanded, 2007 edition (Version 3.0)

Strunk and White's The Elements of Style

Richard Fein, Cover Letters! Cover Letters! Cover Letters!, 2nd edition

Ron Fry, 101 Great Answers to the Toughest Interview Questions, 4th edition

Ron Fry, 101 Great Resumes, revised edition

Becker and Becker, Powerful Presentation Skills

Cuckoo's Egg by Clifford Stoll

E-mail 

It is important for all course students to have an Internet-based e-mail account for this class. Students may use a university account or their own personal account.

Course Website

This course has its own web site, containing assignments and readings. Please consult this site for the latest information regarding this course. It is located on the Internet at:

<https://www.albany.edu/~gc227838/ist499w>

The course also uses Blackboard to manage submittals and assignments.  Please refer to your Blackboard account for these item.

Grading

Participation in class discussions and class prep (ie - collaboration assignment) = 5 points

Assignment 1 - Resume and cover letter and LinkedIn site update = 15 points

Assignment 2 - Collaboration research = 10 points

Assignment 3 - Re-do resume per LHH in-class discussions = 5 points

Exam = 20 points

Team presentation = 20 points

Final paper (15) & presentation (5) & peer review comments (5) = 25 points

Points will be deducted for unexcused absences, lateness, and early departures.

Grading Scale

A: 100-95 points A-: 94-90 points

B+: 89-87 points B: 84-86 points B-: 80-83 points 

C+: 79-76 points C: 75-70 points  

D: 69-60 points

F: 59 points and below

If you have any questions regarding the assignments and exams, please see me in person or send email directly to me.


Participation

Each student is expected to participate in every class. Positive participation means speaking so everyone can hear; asking appropriate questions; replying to questions, contributing ideas and participating in discussion without dominating it; and helping others.  Positive participation creates a supportive learning environment in which other students feel comfortable asking questions and everyone contributes to the discussion. 

Positive participation requires that students come prepared for class.  This means distilling the terminology and major concepts of assigned readings; having points of personal interest in mind for discussion; having questions in mind for ideas that are unclear; knowing what the day’s topics will be and what assignments are due; and bringing appropriate texts, materials, and tools for the day’s class. 

Written and Verbal Expression

Being able to communicate effectively with all sorts of people is necessary for  sustained success in managing information systems.   Students are expected to use proper spelling and grammar and to adapt their speaking and writing to their audience.  Those who habitually use words, phrases, abbreviations or acronyms that may be unfamiliar to the audience without proactively explaining them in an understandable way, will have points deducted in written assignments and in class participation as applicable.

Class Attendance/Lateness

There will be a 15 minute break during each class. Students are expected to attend every scheduled class.  Students are responsible for all assignments, handouts, and work done in classes that are missed.

Academic Honesty

Students are expected to understand and abide by the “Standards of Academy Integrity” outlined at:

https://www.albany.edu/undergraduate_bulletin/regulations.html

If you are found to violate academic integrity in any way, you will get a 0 on the assignment and be reported to the Dean of Undergraduate Studies. If you violate academic integrity twice during the course, you will FAIL the entire course.

Class Schedule

The class meets on Monday from 4:15-7:05PM.  The schedule of classes as well as the other information in this syllabus is subject to change.  The latest, authoritative version is the current one posted this website. All necessary changes will be announced in class.  Exam dates will not be changed.


Date In-class Topic Homework Assignment (due at start of class)
1/25

Introduction, expectations, assignments, books
Resumes and cover letters
on-line business networking tools
Changing Workplace / Flat World / AGF Chapter 1

--

2/1
Resumes and cover letters
Interviewing for a Job
Peer Review
How to give a Presentation


 

Find a job description you are interested in. Write a cover letter for that job. Bring the description, cover letter, and resume into class for peer view.  Hard copy only please.   Read and refer to How to Ensure Your Resume Produces Top Results and The Most Important Ten Seconds of Your Job Search and class discussion to build the best resume / cover letter.
Read: Presentations
Read : AGF Chapter 1
2/8
Online Collaboration Tools and Technologies
Real-time vs Non real-time tools
Effective Communication Technologies and Methods

Assignment 1 - Due 2/8 - Submit the job description, and your final peer reviewed cover letter and resume via your blackboard account. Create an account using LinkedIn and enter  / update all of your resume info.  Locate me (Guy Cortesi) on LinkedIn and request a connection.  Add other connections as you see fit.



2/15

No class

 


2/22 Guest Speaker - Jeanne Covert LHH
Resume overview
Networking /social platforms
Behavior Based Interviewing



Online Collaboration Tools and Technologies (student led in-class demos)
Team finalization and signup - Team 1 determine topic and team leader.

Signup for a Team (1 of 6) on the course Blackboard Website

Assignment 2 - Due 2/22 - Research Online Collaboration Tools.  Determine the various categories of tools and determine the pros and cons of each class and type. Enter this into and Excel spreadsheet as a weighted decision / criteria matix, as discussed in class, and upload the file to Blackboard.  Be prepared to do a 5 minute presentation on one of your favorite tools for group and team collaboration. Do not plan to use PowerPoint for this presentation, though you may use the projector to login to demo certain tools.


Read AGF Ch 2

3/1

Topics:

Privacy, Freedom of Speech
Related links:
http://www.stopthespying.org/

Discuss team presentations

Assignment 3 -  Due 3/1

Via Blackboard:

(1) Update and submit (upload) your resume based on in-class discussions and presentation by guest speaker from LHH on 2/22.

(2) Submit a one or two paragraph summary of your final paper / individual final presentation topic (MS Word format)
(3) Team leaders (only) one or two paragraph summary of team presentation plans (MS Word format).

 Read AGF Ch 3

3/8

Topic: Intellectual Property

Related links:
http://www.csmonitor.com/2007/1207/p09s01-coop.html

Team Presentation 1


Read AGF Ch 4



 

3/15

Exam (1/2 class) - the exam will cover in-class lectures and the readings to date (all topics).  The format of the exam will be multiple choice, true/false and short answer.

Topic: Crime

Team Presentation 2

Read AGF Ch 5


 

3/22

Topic: Work

Team Presentations 3 & 4

Read AGF Ch 6


3/29

No Class

--

 

4/5
No Class
--
4/12

Topic: Evaluating and Controlling Technology

Team Presentation 5

Draft of your final paper due - 4/12.  Bring into class for peer review.  Paper copy only please.


Read AGF Ch 7

 

4/19

Topic: Errors, Failures, and Risk


Team Presentation 6
Individual Final Presentations

Do a peer review of someone's paper - Due 4/19. Return your comments to that student in class.  The peer review should follow the methods discussed in class and include a rubric.


Prepare your final presentation talk.  You should be ready to give it on on meeting day that includes 4/19, 4/26 and 5/3


Read AGF Ch 8

 

4/26

Individual Final Presentations (Continued)

Topic: Professional Ethics and Responsibilities


Incorporate peer review comments into final paper - Due 4/26. 


5/3

Individual Final Presentations (Continued)

Last Class

Bring printed peer reviewed copy of paper to class to turn in to the instructor. The student doing the review will be graded on the quality and scope and thoroughness of their review, based on the methods discussed in class. This is worth 5 points. - Due 5/3.

Final paper also due 5/3. Hand in your final paper ELECTRONICALLY via Blackboard. 

 


Team and Presentations:

Plan to spend about 45 minutes on your presentation and discussion. You can rely on the book, but you will also need to do additional research and preparation. You may present your opinions, but you must also back it up with research. It needs to be more than "This is what I think and that's how it is."

You will be graded on your presentation skills, your notes, and how you lead the class discussion.

At the end of each chapter in AGF is a section for assignments. You should use these as a basis for selecting your presentation topics, though you may select other topics based on ideas shared in class, you own interest and relavance to class discussions, etc.  Topics, presentation dates and groups / teams must be approved in advance and scheduled.  A list of suggested topics is provided below.

Draft and Final Paper Assignment/Peer Review / Individual Presentation Assignment:

You will select a topic relating to information science that requires critical evaluation on your part and do in-depth research on that topic to make an informed opinion and/or convincing argument for or against something. It may or may not be a topic we cover in class, but if we did cover it, you must examine a different angle or look more in-depth at it than we did in class. The final paper must be 5 written pages, with standard double-spaced formatting, not including the cover and thorough reference list (Bibliography). The total paper including cover and references should be 7 pages, with 1 page for cover and 1 page for references. 

You will present your research to the class at the end of the semester. You will need to turn in a draft of your paper. That week, one of your classmates will peer review your paper (and you will review someone else's paper) and turn it back to you. The peer review will consist of positive and critical comments on the draft, as well as an attachment with your notes and comments to the writer. You will also turn a copy of your comments in to me to be graded. The final paper is due the last day of class.  In addition, students will present an oral 5 minute summary of their topic to the class.

Grading Criteria for Final Paper: (15 Points total) - (In addition, the peer review of another students paper is worth 5 points.  The presentation of the Final Paper is worth 5 points, such that the Final Project, including the Paper, Presentation and Peer review is worth 25 points total)

The proposal, including cover page, detailed writeup and discussion as identified above, and a complete list of MLA formatted references shall be 7 pages in length.

Overall presentation (Professional appearance, quality of work, proper length, grammar, spelling, pg #’s, cover, double-spaced) 4 pts

Introduction (Provides reader with tech summary, background/executive summary) 2 pts

Technical content and depth of coverage (Technical accuracy, completeness) 4 pts

Policy issues (Addresses pros and cons of technology or issue, possible security concerns, and addresses policy issues) 4 pts

References (Uses MLA format and provides adequate content, includes at least 5 sources) 1 pt

Suggested topics for Final Papers and Team Presentations:

Deep packet inspection.
What is it? What are its positive uses? What are its negative uses?
Give examples. Consider network security, censorship,
management of network traffic, privacy, and any other relevant areas.

Devices to assist people with disabilities.
Report on computer-based technologies that assist people with
disabilities. Consider blind people, deaf people, people who use
wheelchairs, people with limited use of their hands and arms, etc.
Describe some of the new tools and their impact. Discuss issues such
as cost, any problems with these devices, etc. (Focus on newer
developments, e.g., devices not mentioned in the textbook.)

Identification and biometrics.
A company sells an identification chip that is implanted under a person's
skin. About the size of a grain of rice, it contains personal information
and emits a radio signal that identifies the person. Give examples of
where the chips is currently used. Discuss beneficial uses, potential
problems and abuses, and appropriate guidelines for use of such a chip
and other identification technologies, including various biometrics.

Telemedicine.
Describe applications, from remote consultation to remote surgery.
Benefits, possible problem areas (privacy, errors, loss of personalized
care).

Health information on the Web.
Research and report on Web-based health information sites, including
such issues as benefits, reliability of the information, privacy
protections, techniques being developed to rate or accredit sites,
impact on medical care. Patients of some healthcare providers can
access their own records online. Describe an example. How does it
affect medical care?

Privacy on the Web.
What's happening now? Recent abuses and improvements. Describe and
evaluate Web site policies and technical and policy privacy protections
provided by the market, and current proposals for government regulations.

Privacy for organizations and businesses.
All our discussion of privacy concerns privacy for people. There have
been incidents in which sensitive information that organizations and
businesses must provide to government agencies has been made public,
intentionally, accidentally, or by leaks. Release of information about
fund-raising, sales plans, pricing, members, or customers might aid
competitors. Release of information about manufacture of, storage of,
and security for certain chemicals could aid terrorists. Report on
some cases and discuss reasonable extensions of principles about
privacy for organizations and businesses.

Personal data privacy regulations in other countries.
Report on personal data privacy regulations, Web site privacy policies,
and law enforcement access to personal data in one or more countries,
e.g. the European Union.

Computers in law enforcement.
Issues include benefits to crime fighting, invasion of privacy,
problems caused for innocent people because of errors. Describe cases
where a computer system has been very helpful in catching a criminal
or vindicating an innocent person, and describe cases where a computer
system has caused serious problems. An activity for this project could
include a ride-along in a police car. (A few students did this in the
past and found it very instructive.) Another possible activity is to
interview someone who runs or supervises the use of local law enforcement
computer systems. What databases do they access? How do they prevent
unauthorized access?

Computers in the legal/justice system.
Describe systems in use, from legal databases to artificial intelligence
programs that help judges determine sentences. Consider the possibility
of AI systems making judgments in some legal cases. Describe and evaluate
pros and cons.

Technological responses to terrorism.
Describe and evaluate some of the computer-based technologies implemented
or expanded after Sept. 11, 2001. Consider effectiveness, cost, impact
on daily life, air travel, risks, etc., and arguments related to privacy
and civil liberties.

Children on the Internet.
There are several problem areas: availability of material not appropriate
for children, contact with people who seek to abuse children, and privacy
risks from game sites that ask children for extensive personal and
family information (for marketing purposes). How serious are these
problems? What is being done about them? Evaluate various solutions.
Do benefits for children on the Net outweigh risks? Can we arrange to
have the benefits without the risks?

The Global Economy.
What are the roles and impacts of computers and communications
technology in the increase of trans-border economic activity (e.g.,
eBay as a global garage sale; customer service workers in other
countries handling U.S. consumer calls; databases to track the origin
of a cow with Mad Cow Disease; etc.)? What are the benefits? What are
the problems? Is this aspect of increased globalization a good thing
for people in the U.S., for people in other countries, for humanity in
general?

Automated systems.
Study progress, safety, and social issues related to an automated system
such as automated highways and self-driving vehicles.

Safety-critical applications.
Find a local application to study, or study the Air Traffic Control
system, systems to prevent train crashes, a particular area of medical
devices, or other similar topic. Describe systems in use, discuss
benefits and risks.

Use of computer and Web technology by restaurants.
Investigate and discuss issues such as customer service, impact on
employment, food safety, ambiance. Visit a restaurant with self-service
ordering terminals. Some fast food restaurants use robotic devices
for food preparation; report on one. Interview a waiter or restaurant
manager. (This could be part of a paper that looks at the impact of
computer automation in two or three industries or consumer services.)

Spam.
Describe and evaluate technical solutions, current legislation and
regulation, and significant proposed legislation. Some people propose
that the federal government create a "Do not spam" list, like the "DO
not call" list for telemarketers. Discuss privacy problems that could
occur with implementation of such a list. Discuss the roles of technical
and legislative solutions for spam. Consider the relevance of freedom
of speech.

Censorship of the Internet.
Some aspect not covered in the text, or study some issue in more detail.

Information warfare.
Will the next wars be fought without bombs? Will computer networks and
computer-controlled infrastructure be the targets of military hackers?
What is happening now? What kind of defenses are possible?

Recent copyright battles for music and movies.
Report on several recent strategies used by the entertainment industries
(legal, technological, and business) to prevent unauthorized copying.
Evaluate the effectiveness and ethics of the methods. Describe current
controversies.

Free software and open source software.
What's happening with "free" software and open-source software now?
What is their impact? What are the implications for consumers? For big
companies like Microsoft?

Identity theft.
What is the current state of the problem? Describe relevant laws. How
have consumers and businesses changed behavior in response to Identity
Theft? What technical solutions have developed?

Hacktivism.
Report on specific incidents or organizations engaged in hacktivism.
Compare to civil disobedience and to other kinds of hacking.

Are Web issues really new?
Choose two other technologies or innovations, such as radio, telegraph,
railroads, or electricity, and find out what ethical, social, and legal
issues and controversies arose about them. Compare the problems and
issues to current problems and issues about the Web. What solutions
developed? How well do those solutions fit the Web?

Computers and the environment.
How are computers used by nature researchers and organizations. Describe
applications that help protect the environment. Describe aspects of
computers that cause environmental problems. What do environmentalists
think of computers?

Political activism on the Net in the U.S. (or other politically free
country).
How has the Internet helped or hurt political groups outside the
mainstream? How is it used by major political parties and candidates?
What is the impact? How do/should current regulations about political
campaigns affect individuals and small organizations that set up Web
pages to support/oppose candidates and issues?


Politial organizing in unfree countries.
Choose one country or a few countries that restrict political freedom.
Describe how people use social networking sites and other Internet
technologies to organize political events, strikes, protests, boycotts,
etc. How have these techniques affected the politics of the country?
How have the governments responded? What do these experiences suggest
for the future of political freedom and democracy?

Electronic Voting and Internet Voting.
The U.S. and some other countries have experimented with voting on the
Internet or using electronic voting machines. How successful were the
first experiments? Will most political elections be held on the Internet
in the future? Discuss the problems of maintaining secret ballots,
preventing election fraud, and providing for recounts (for both electronic
voting machines and Internet voting). What other issues are relevant?
How are the states (and other nations) handling these issues?

Violence in video/computer games.
What is the impact on children? How does it differ from television?
Interview people who write and publish computer games to find out their
policies and views about violent games.

Use of the Web in schools.
Are students being taught to use the Web effectively, wisely, and safely?

Distance learning.
What are the common uses? What will be the impact on universities? On
adult education? Is cheating a problem?

Monitoring of employees' Web use and e-mail.
What policies are employers using? Perhaps study a few large businesses
in your area. Evaluate policies for different kinds of employers (e.g.,
for your university, covering students, faculty, and staff, and for a
software company in a highly competitive business).

Cyberspace communities.
What makes a "community"? How do cyberspace communities handle
decision making, dealing with troublesome members, etc.? Find one
community to study in depth, preferably one that you are a member of
or have a special interest in. (Please respect the community's privacy
guidelines and ask permission if quoting members.)

Gender or ethnic issues.
The _Journal of Women and Minorities in Science and Engineering_ might
have some useful articles for background and ideas for specific projects.
There have been several studies of differences in the way men and women
use computers. Compare Web sites aimed at women or at specific ethnic
minority audiences with the Web in general.

Computing and network access in other countries.
For example, how are computers used in rural, poor areas of Africa?
Choose one country to study in depth or compare a few.

Science fiction and prediction.
Find several science fiction stories published at least 30 years ago
that are set in the present time or near future and describe computer
and communications technologies. Report on how closely their view of
the technology corresponds to what is actually available. What social
benefits and problems did they anticipate?

What will the world be like 50 years from now?
How will electronic communications and commerce affect the power of
centralized governments? Everyday life? What will happen as computers
are connected to the human body? Will human intelligence be of less
value in the future? Several experts have written books addressing
these issues. You could read two or three and evaluate their predictions.

Updated 4/9/10 gjc