ENGR 350 Textbook Presentation Topics Privacy and Personal Information 2.2 "Big Brother Is Watching You" Derek Scholten 2.3 Consumer Information Kyle Partridge 2.4 More Privacy Risks Maria Santella 2.6 Protecting Privacy: Law and Regulations Dung Phan Encryption and Interception of Software 3.2 Intercepting Communications Hyungkwon Seo 3.3 Cryptography and Its Uses Pawan Taparia 3.4 Encryption Policy: Access to Software, Ryan James Keys, and Plaintext Can We Trust the Computer 4.1 What Can Go Wrong? Nguyen, Nguyen Kim 4.2 Case Study: The Therac-25 Boutsaba Janetvilay 4.3 Increasing Reliability and Safety Robert Hughes 4.5 Computer Models Deana Hajmeirza Freedom of Speech in Cyberspace 5.2 Offensive Speech and Censorship in Cyberspace Jacqueline Wengert 5.4 Spam Jonathan Shinn Intellectual Property 6.2 Copyright Law Levin Purba 6.3 Copying Music, Movies, Software, and Books Frederick Camba 6.4 Solutions (Good and Bad) Jesse Dahl 6.7 Issues for Software Developers Jose Lopez Computers and Work 8.4 Employee Monitoring Rachid Barni Groups (3 people each) Professional Ethics and Responsibilities 10.1, 10.2 Ethics, Ethical Guidelines for Computer Professionals Jose Lopez, Jesse Dahl, Hyungkwon Seo 10.3 Cases (perhaps include real examples) Boutsaba Janetvilay, Nguyen Kim Nguyen Computer Crime 7.2 Hacking Rachid Barni, Derek Scholten, Kyle Partridge, Ryan James 7.4 Fraud, Embezzlement, Information Theft, and Forgery Jonathan Shinn, Robert Hughes, Maria Santella Computers and Work 8.2 Impact on Employment (include globalization) Dung Phan, Deana Hajmeirza, Levin Purba Broader Issues on the Impact and Control of Computers 9.1, 9.2 Computers and Community (include social computing) Information Haves and Have-Nots: The Access Issue Frederick Campo, Pawan Taparia, Jacqueline Wengert