| Week |
Day |
Date |
Topic |
Reading |
| 2 |
Mon |
1/26 |
Intro. to Ethical Theory |
Quinn Ch. 2 (pp. 53-96) |
| 3 |
Mon |
2/2 |
Networking |
Quinn Ch. 3 (pp. 107-145) |
| 4 |
Mon |
2/9 |
Intellectual Property |
Quinn Ch. 4.1-4.5 (pp. 159-185) |
| 5 |
Mon |
2/16 |
Peer-to-Peer and Software Licensing |
Quinn Ch. 4.6-4.10 (pp. 185-206) |
| 6 |
Mon |
2/23 |
Privacy and Surveillance |
Quinn Ch. 5.1-5.8 (pp. 220-255) |
| 7 |
Mon |
3/2 |
Data Mining, ID Theft, and Encryption |
Quinn Ch. 5.9-5.11 (pp. 255-276) |
| 10 |
Mon |
4/6 |
Computer and Network Security |
Quinn Ch. 6 (pp. 294-324) |
| 11 |
Mon |
4/13 |
Software Reliability |
Quinn Ch. 7 (pp. 341-377) |
| 12 |
Mon |
4/20 |
Professional Ethics |
Quinn Ch. 8 (pp. 385-418) |
| 13 |
Mon |
4/27 |
Work and Wealth |
Quinn Ch. 9 (pp. 429-464) |
| 14 |
Mon |
5/4 |
Computer History |
Quinn Ch. 1 (pp. 1-43) |
| 14 |
Wed |
5/6 |
Artificial Intelligence |
|