In Class Presentations:

Content
  • Presentation must present and focus on a case.
  • Case must be related to cyberethics, computing, internet, or subject matter relevant to the course.
  • Ideally the case should represent a "policy vacuum" and/or "conceptual muddle" (see Ethics text for description) related to Cyber-Ethics either current or historical.
  • Case can be historical, court, contemporary, or near future case.

Format
  • debate / argument
  • case / court case / trial /
  • discussion / talk show / Springer
  • Teams (pairs) are ok, but graded individually (be sure to distinguish parts)
  • 10-20 minute per group
  • typically, 4 students per week. Groups MUST coordinate to cover the topic without overlap for the week.

Grading: 15% of class grade (10 points, 1/2 point precision)
3 pts: Presented when assigned
3 pts: Relevance of topic and value to class
4 pts: Guiding materials, product, A/V aides
5 pts: Content
  • argument
  • case
  • discussion

See GroupsAndTopics

Here's some other sites with good cases:
http://ethics.tamu.edu/ethicscasestudies.htm
http://ethics.csc.ncsu.edu/
http://www.vanderbilt.edu/CenterforEthics/cases.html#engineering
http://lp.findlaw.com/
http://www.dmoz.org/Computers/Ethics/
http://www.web-miner.com/ethicscases.htm

Some suggested topics include the following:

Microsoft Antitrust case
Recent Supreme Court case on filesharing software
Internet censorship -- Recent case of Google censored in China
Cases of ethics and usability, requirements, user-centered design

OTHER POSSIBIBLE TOPIC IDEAS:
ADA requirements
SPAM, email tax, email fees
Workplace monitoring
Industrial espionage
Intellectual property
Privacy
CyberStalking
Database Privacy
Cookies
Identity theft
Big Brother Tech.
Clipper Chip
Carnivore
Anonymity
Netiquette
Free Speech
Hate Speech
Comm. Decency Act
Internet Filters
MP3, Peer to Peer
Piracy
Digital Millineum Copyright Act
Fair Use, Education, and Technology
Licensing
CyberWar (DoS)
Biotechnology Ethics
Spamming, Phishing
Identity Fraud
Cybersquatting
ICANN
Hackers
Liability for defective software
Viruses, worms, and "malware"
Technology obsolescence
Losing jobs to automation
I.T. Outsourcing
Cryptography, encryption
Whistle-blowing
Internet Tax (Freedom Act)
Bundling
Vaporware
Fault Tolerance (network outage)
Simulation Risks