PHIL 1145 Technology and Human Values Studies philosophy of technology, as well as ethics and modern technology. Considers the relationship between technology and humanity, the social dimensions of technology, and ethical issues raised by emerging technologies. Discusses emerging technologies such as biotechnology, information technology, nanotechnology, and virtual reality.
PHIL 2016 Philosophy and Ethics of Lying and Deception Examines lying and other forms of deception in a wide range of modern contexts from advertising to politics, using different theoretical approaches. Offers students an opportunity to use philosophical theories and methodologies to investigate what lying is, why people lie, when and why it is wrong to lie, and how we can learn from what other people say despite all of this lying. In modern society, we are confronted with lies, spin, half-truths, fake news, and even “BS” on a daily basis. Since these forms of deception play such a central role in human life, many philosophers—including Plato, Augustine, and Kant—have studied the ontology, ethics, epistemology, economics, and logic of lying and deception.
CY 4170 The Law, Ethics, and Policy of Data and Digital Technologies. Describes the legal and ethical issues associated with collection, use, disclosure, and protection of digital information. Emphasizes legal infrastructure relating to privacy, data ethics, data security, hacking, automation, and intellectual property. Articulates the basic set of rules and rights that are relevant to data practices and protection, evaluates how these rules apply in context, and critically analyzes their efficacy and social impact.
CY 5240 Cyberlaw: Privacy, Ethics, and Digital Rights. Describes the legal and ethical issues associated with information security including access, use, and dissemination. Emphasizes legal infrastructure relating to information assurance, such as the Digital Millenium Copyright Act and Telecommunications Decency Act, and emerging technologies for management of digital rights. Examines the role of information security in various domains such as healthcare, scientific research, and personal communications such as email. Examines criminal activities such as computer fraud and abuse, desktop forgery, embezzlement, child pornography, computer trespass, and computer piracy.