ENGR 350 Textbook Presentation Topics Privacy and Personal Information 2.2 "Big Brother Is Watching You" 9-12 Varun R. 2.3 Consumer Information 9-12 Kristin V. 2.4 More Privacy Risks 9-19 Quin N. 2.6 Protecting Privacy: Law and Regulations 9-19 Bao L. Encryption and Interception of Software 3.2 Intercepting Communications 9-26 Syed H. 3.3 Cryptography and Its Uses 9-26 Philip B. 3.4 Encryption Policy: Access to Software, 10- 3 Mark T. Keys, and Plaintext Can We Trust the Computer 4.1 What Can Go Wrong? 10- 3 Roberto T. 4.2 Case Study: The Therac-25 10-10 Ba M. 4.3 Increasing Reliability and Safety 10-10 Byron S. 4.5 Computer Models 10-17 Dr. Gittleman Freedom of Speech in Cyberspace 5.2 Offensive Speech and Censorship in Cyberspace 10-17 Scott W. 5.4 Spam 10-31 Dionne C. Intellectual Property 6.2 Copyright Law 10-31 Tyler S. 6.3 Copying Music, Movies, Software, and Books 11- 7 Van N. 6.4 Solutions (Good and Bad) 11-14 Kervin C. 6.7 Issues for Software Developers TBD Dr. Gittleman Professional Ethics and Responsibilities 10.1, 10.2 Ethics, Ethical Guidelines for Computer Professionals 11-14 Dr. Gittleman 10.3 Cases (perhaps include real examples) 11-28 Dr. Gittleman Groups (3 people each) Computer Crime 7.2 Hacking 11-28 Varun,Bao,Syed 7.4 Fraud, Embezzlement, Information Theft, 12- 5 Byron, Quin, Tyler and Forgery Computers and Work 8.2 Impact on Employment (include globalization) 12- 5 Dionne, Kervin, Scott 8.3, 8.4 The Work Environment and Employee Monitoring 12-12 Philip,Mark,Ba Broader Issues on the Impact and Control of Computers 9.1, 9.2 Computers and Community 12-12 Kristin, Van, Roberto (include social computing) Information Haves and Have-Nots: The Access Issue