COM1009 Computer Ethics

Common Core Curriculum Office (CCCO) > COM1009 Computer Ethics
Department
Computer Science
Cluster
4 (Moral Reasoning)

Prerequisite

GEN1000 Perspectives on General Education / Subject to Discretion of Module Coordinator

Exclusion

Nil

Module Description

The module examines the relationships between computer technology, computer ethics, and society. Computer ethics is regarded as the analysis of the nature and social impact of computer technology and the corresponding formulation and rationalization of codes for the ethical design and use of such computer technologies. The module explores the history and development of computer technology, and explores its challenges and opportunities to the society from a moral perspective, using major ethical theories, such as Kantianism, Utilitarianism, Social Contract Theory, and Virtue Ethics. It helps students develop the moral reasoning ability to use computers in daily life ethically.

Module Intended Learning Outcomes (MILO)

Upon completion of this module, students should be able to: 
a. identify the relationships between computer ethics and society; 
b. explain and evaluate various ethical theories; 
c. explore the history and development of contemporary computer technology, and analyze the ethical issues of these computer technology on the society;
d. engage in moral debate and ethical reasoning of various computer usage in a rational manner. 

Module Content

1. Introduction and overview

1.1 Development of computer systems
1.2 Social impacts of the development

2. Computer ethics

2.1 Definition of computer ethics and its relationship with other ethics, e.g., cyber ethics and professional ethics
2.2 Why we study computer ethics?

3. Ethical analysis

3.1 Definition of ethical analysis
3.2 Examples of ethical theories
3.3 Applying ethical analysis in practice

4. Impact of computer technology on freedom of expression

4.1 Controlling access to information on the cyber world
4.2 Anonymity on the cyber world

5. Privacy in the Internet age

5.1 Privacy definition
5.2 Perspectives on privacy
5.3 Online privacy concerns

6. Intellectual Property

6.1 Protecting intellectual property
6.2 Challenges to intellectual property due to computer technology

7. Ethical use of computer systems

7.1 Case studies – e.g., Internet Etiquette – cyberbullying and doing

8. Ethical development of computer systems

8.1 Case studies – e.g., autonomous systems, AI

Assessment Methods

1. Class exercise (20%)
2. Project
a. Presentation (20%)
b. Essay (30%)
3. Test (30%)