These materials are from a past semester of this course at the U-M School of Information. For details and a syllabus of the current course, please see https://www.si.umich.edu/programs/courses/410.
Ethics and Information Technology focuses on the ethical dilemmas that exist where human beings, information objects, and social computing technologies interact. The course explores emerging ethical models from historical and cross-cultural perspectives and then applies these models to a variety of new and emerging technologies that are inherently social in their construction and use. Initial examples of issues that the course covers in discrete modules include: the integrity of digital content in a networked world; identity and avatars; and interpersonal engagement through online games and virtual environments. Students explore the technological underpinnings of associated technology systems, experiment with individual and group interaction with technologies, and examine the mechanics of ethical and unethical behaviors.
Instructor: Paul Conway
dScribe: Emily Mahood Bowman
Course Level: Undergraduate
Course Structure: Two lectures and one lab each week
Syllabus
Course Overview
Ethics and Information Technology concerns the ethical dilemmas that exist where human beings, information objects, and social computing technologies interact. The course explores emerging ethical models from historical and cross-cultural perspectives and then applies these models to a variety of new and emerging technologies that are inherently social in their construction and use. Initial examples of issues that the course covers in discrete modules include: the integrity of digital content in a networked world; identity and avatars; and interpersonal engagement through online games and virtual environments. Students explore the technological underpinnings of associated technology systems, experiment with individual and group interaction with technologies, and examine the mechanics of ethical and unethical behaviors. The course satisfies the LSA Upper Level Writing Requirement, so significant writing assignments reinforce learning through collaborative editing, reflection on personal identity, and an essay on the notion that traditional ethical norms may or may not be relevant in the new technology environment.
Course Objectives
Learning outcomes
- Demonstrate knowledge of current models of information and computer ethics.
- Apply ethical theories to interpret personal and group behavior when using a variety of information technology tools.
- Evaluate the nature of ethical choices made by self and others when serving various roles that expose social and multicultural differences.
- Construct written arguments in a variety of formats on the evolving nature of ethical norms relating to new technologies.
Instructional objectives
- Integrate opportunities for direct hands-on technical experiences, in order to enhance understanding of ethical challenges presented by new information technologies.
- Foster intense participation in course learning activities via in-class discussions, posts submitted to an online discussion boards, and longer written assignments; in order to encourage multimodal contributions by students.
Reading
The domain where ethics and technology intersect is rich with thoughtful writing from a variety of disciplines; part of the purpose of the course is to sample some of this literature. There is no textbook for this course. Many readings are drawn from the primary research journal in the field, Ethics and Information Technology and from a recently published compilation of articles by some of the best philosophers and technologists working in the area: Kenneth Einar Himma and Herman T. Tavani (eds.). The Handbook of Information and Computer Ethics. New York: Wiley, 2008. All of the required readings are located either on CTools, available through University Reserves, or available through the University Library gateway.
Grading Overview
Overall participation in class 15%
Essay on Philosophy and IT (Personal) 20%
Create MediaWiki Content (Collaboration) 25%
Reflection on Avatars/Identity (Peer) 25%
Ethical Game Scenario (Team) 15%
Attendance at all classes is mandatory; the essay is graded individually before and after revisions; MediaWiki contributions are evaluated collaboratively; the personal reflection is graded individually after revisions; the game scenario is peer graded by teams.
Academic Integrity
All students in this course will be held to high standards of scholarship and integrity. Personal responsibility and integrity are assumed, and all forms of academic dishonesty and misconduct are prohibited. Academic dishonesty may be understood as any action or attempted action that may result in creating an unfair academic advantage for oneself or an unfair academic advantage or disadvantage for any other member or members of the class. The instructor will not tolerate any conduct, without regard to motive, that violates the academic integrity and ethical standards of the University community. Issues of academic integrity will be handled according to the policies established by LSA.
Students with Disabilities
The University of Michigan provides reasonable accommodations for all students with disabilities. To ensure that your needs are met in a timely manner, please contact me with any requests for accommodation as early in the term as possible. For additional information on services and support, visit the website for UM Services for Students with Disabilities.
Classroom Technology Etiquette
Students are encouraged to bring notebook computers to class and to use them actively as learning tools. Students should:
- Use laptops for taking notes, conducting research required for activities, and other specific classroom tasks as assigned by the instructor. During class, students should not check e-mail, chat, IM, play games, or perform other off-task activities.
- Engage in class activity as actively as they would in any other class. The computer should not become a barrier to one-on-one interaction, but instead should help facilitate the exchange of ideas and engagement in classroom contact. If you know you are not good at multi-tasking, minimize the use of your notebook in class.
- Show sensitivity to others. Students should not display screen images and multimedia content that might be distracting or offensive to other members of the class, including wallpapers, screen savers.
Office Hours
I encourage you to take advantage of at least one office hour session during the course. I am available and willing to provide advice on all aspects of the course, including course readings, writing assignments, laboratory exercises, grading and assessment generally, as well as the topical substance of the course itself.
Course Evaluation
There is no final examination in the course. Instead, part of the final class period will be used for summative evaluation of the course by students, discussion on perspectives on ethical issues in general, and the administration of a post-test instrument on ethical judgments.
Staff members from the Center for Research on Teaching and Learning have been involved in the design of the course and will assist at points through the course in evaluation activities. CRLT staff will observe selected class segments and provide feedback, and will moderate the summative evaluation of the course. CRLT involvement in the course is supported by funds from the Provost’s Office.
Learning Outcomes
Learning Outcomes
- Demonstrate knowledge of current models of information and computer ethics.
- Apply ethical theories to interpret personal and group behavior when using a variety of information technology tools.
- Evaluate the nature of ethical choices made by self and others when serving various roles that expose social and multicultural differences.
- Construct written arguments in a variety of formats on the evolving nature of ethical norms relating to new technologies.
Instructional Objectives
- Integrate opportunities for direct hands-on technical experiences, in order to enhance understanding of ethical challenges presented by new information technologies.
- Foster intense participation in course learning activities via in-class discussions, posts submitted to an online discussion boards, and longer written assignments; in order to encourage multimodal contributions by students.
Reading List
There is no textbook for this course. Many readings are drawn from the primary research journal in the field,Ethics and Information Technology and from a recently published compilation of articles by some of the best philosophers and technologists working in the area: Kenneth Einar Himma and Herman T. Tavani (eds.). The Handbook of Information and Computer Ethics. New York: Wiley, 2008.
Please refer to the Reading Guides under the Materials tab (above) for more detailed information about the readings for this course.
About the Creators
About Paul Conway
Paul Conway is an associate professor in the School of Information. His research interests include the challenges of representing and interpreting audio, visual and textual resources in digital form, extracting knowledge from large-scale image databases, and modeling the use of archives in interdisciplinary scholarship in the humanities. Conway has extensive teaching and administrative experience in the archives and preservation professions. Before joining the Michigan faculty in 2006, he held administrative positions at Duke University, Yale University, the National Archives and Records Administration, and the Society of American Archivists. He began his career as an archivist at the Gerald R. Ford Library on the U-M North Campus. Conway has made major contributions over the past 30 years to the literature on archival users and use, preservation management, and digital imaging technologies. In 2005, Conway received the American Library Association's Paul Banks and Carolyn Harris Preservation Award for his contributions to the preservation field. He currently serves on the Editorial Board of American Archivist and is a Fellow of the Society of American Archivists. more...
- Ph.D. in information and library studies, University of Michigan
- MA in history and administration of archives, University of Michigan
- BA in history, Indiana University
Jump to:
Document Title | Creator | Downloads | License |
---|---|---|---|
Assignment 0: SI 410 Assignment Summary and Grading |
Paul Conway
|
||
Assignment 1: Essay on Philosophy and Information Technology |
Paul Conway
|
||
Assignment 2: Collaborative Wiki Writing and Editing |
Paul Conway
|
||
Assignment 3: Avatars and Personal Identity |
Paul Conway
|
||
Assignment 4: Gaining Advantage Scenario |
Paul Conway
|
Document Title | Creator | Downloads | License |
---|---|---|---|
Course Overview |
Paul Conway
|
||
Schedule |
Paul Conway
|
||
Weeks 01 - 03: Reading Guide |
Paul Conway
|
||
Weeks 04 - 07: Reading Guide |
Paul Conway
|
||
Weeks 08 - 10: Reading Guide |
Paul Conway
|
||
Weeks 11-14: Reading Guide |
Paul Conway
|
Document Title | Creator | Downloads | License |
---|---|---|---|
Course/Resource Archive in Institutional Repository (November 2011) |
Paul Conway
|
||
Week 01: Computer/Information Ethics |
Paul Conway
|
||
Week 02a: Transparency and Virtue Ethics |
Paul Conway
|
||
Week 03: Back to the Really Big Picture |
Paul Conway
|
||
Week 04a: Boundaries of Trust |
Paul Conway
|
||
Week 04b: Wikipedia and Credibility |
Paul Conway
|
||
Week 05a: Trust Management |
Paul Conway
|
||
Week 05b: Lessons of Wikipedia |
Paul Conway
|
||
Week 06a: Plagiarism in the Online Environment |
Paul Conway
|
||
Week 06b: Trusting Virtual Trust |
Paul Conway
|
||
Week 08a: Moral Rights of Avatars |
Paul Conway
|
||
Week 08b: Identity in Cyberspace |
Paul Conway
|
||
Week 09a: Avatars – Continuum or Prosthesis |
Paul Conway
|
||
Week 09b: Avatars and Anonymity |
Paul Conway
|
||
Week 10a: Privacy Reconsidered |
Paul Conway
|
||
Week 10b: Avatars and Identity - Synthesis |
Paul Conway
|
||
Week 11a: Ethics of Game Play |
Paul Conway
|
||
Week 11b: Ethical Game Play |
Paul Conway
|
||
Week 12: Cheating in Games |
Paul Conway
|
||
Week 13a: Gender, Culture and Games |
Paul Conway
|
||
Week 13b: Harm in Cyberspace |
Paul Conway
|
||
Week 14: What Does It All Mean? |
Paul Conway
|
Jump to:
Document Title | Creator | Downloads | License |
---|---|---|---|
Assignment 1: Essay on Philosophy and Information Technology |
Paul Conway
|
||
Week 01: Computer/Information Ethics |
Paul Conway
|
||
Week 02a: Transparency and Virtue Ethics |
Paul Conway
|
||
Week 03: Back to the Really Big Picture |
Paul Conway
|
||
Weeks 01 - 03: Reading Guide |
Paul Conway
|
Document Title | Creator | Downloads | License |
---|---|---|---|
Assignment 2: Collaborative Wiki Writing and Editing |
Paul Conway
|
||
Week 04a: Boundaries of Trust |
Paul Conway
|
||
Week 04b: Wikipedia and Credibility |
Paul Conway
|
||
Week 05a: Trust Management |
Paul Conway
|
||
Week 05b: Lessons of Wikipedia |
Paul Conway
|
||
Week 06a: Plagiarism in the Online Environment |
Paul Conway
|
||
Week 06b: Trusting Virtual Trust |
Paul Conway
|
||
Weeks 04 - 07: Reading Guide |
Paul Conway
|
Document Title | Creator | Downloads | License |
---|---|---|---|
Assignment 3: Avatars and Personal Identity |
Paul Conway
|
||
Week 08a: Moral Rights of Avatars |
Paul Conway
|
||
Week 08b: Identity in Cyberspace |
Paul Conway
|
||
Week 09a: Avatars – Continuum or Prosthesis |
Paul Conway
|
||
Week 09b: Avatars and Anonymity |
Paul Conway
|
||
Week 10a: Privacy Reconsidered |
Paul Conway
|
||
Week 10b: Avatars and Identity - Synthesis |
Paul Conway
|
||
Weeks 08 - 10: Reading Guide |
Paul Conway
|
Document Title | Creator | Downloads | License |
---|---|---|---|
Assignment 4: Gaining Advantage Scenario |
Paul Conway
|
||
Week 11a: Ethics of Game Play |
Paul Conway
|
||
Week 11b: Ethical Game Play |
Paul Conway
|
||
Week 12: Cheating in Games |
Paul Conway
|
||
Week 13a: Gender, Culture and Games |
Paul Conway
|
||
Week 13b: Harm in Cyberspace |
Paul Conway
|
||
Weeks 11-14: Reading Guide |
Paul Conway
|
Document Title | Creator | Downloads | License |
---|---|---|---|
Week 14: What Does It All Mean? |
Paul Conway
|