Lectures
Lecture # | Date | Slide | Reading |
---|---|---|---|
Lecture 1 | Jan 22 | Course Information | |
Lecture 2 | Jan 24 | No Class | |
Lecture 3 | Jan 26 | Unwrapping the Gift | Chapter 1 [Section 1.1-1.2], Slides 2 - 46 |
Lecture 4 | Jan 29 | Unwrapping the Gift | Chapter 1 [Section 1.2], Slides 10 - 46, Links posted on blackboard |
Lecture 5 | Jan 31 | Themes and Ethics | Chapter 1 [Section 1.3-1.4] |
Lecture 6 | Feb 2 | Themes and Ethics Privacy |
Chapter 1 [Section 1.4], Chapter 2 [Section 2.1, 2.2] (Slides 2 - 35) |
Lecture 7 | Feb 5 | Privacy | Chapter 2 [Section 2.2 - 2.5] (Slides 22 - Slides 41) |
Lecture 8 | Feb 7 | Privacy | Chapter 2 [Section 2.3 - 2.5] (Slides 42 - Slides 70) |
Lecture 9 | Feb 9 | Privacy | Chapter 2 [Section 2.5 - 2.7] |
Lecture 10 | Feb 12 | Freedom of Speech | Chapter 3 [Section 3.1-3.2] (Slides 3 - 26) |
Lecture 11 | Feb 14 | Quiz 1 | |
Lecture 12 | Feb 16 | Freedom of Speech | Chapter 3 [Section 3.3-3.5] |
Lecture 13 | Feb 19 | Freedom of Speech | Chapter 3 [Section 3.6-3.7] |
Lecture 14 | Feb 21 | Intellectual Property | Chapter 4 [Section 4.1-4.2] |
Lecture 15 | Feb 23 | Intellectual Property (cont.) | Chapter 4 [Section 4.3-4.4] |
Lecture 16 | Feb 26 | Intellectual Property (cont.) | Chapter 4 [Section 4.5-4.6] |
Lecture 17 | Feb 28 | Crime and Security | Chapter 5 [Section 5.1-5.2] |
Lecture 18 | Mar 2 | Crime and Security (cont.) | Chapter 5 [Section 5.3] |
Lecture 19 | Mar 5 | No class | |
Lecture 20 | Mar 7 | Crime and Security (cont.) | Chapter 5 [Section 5.4-5.5] |
Lecture 21 | Mar 9 | Midterm Review | Chapter 1,2,3,4 |
Lecture 22 | Mar 19 | Midterm | |
Lecture 23 | Mar 21 | No class | |
Lecture 24 | Mar 23 | Crime and Security (cont.) | Chapter 5 [Section 5.6-5.7] |
Lecture 25 | Mar 26 | Work | Chapter 6 [Section 6.1-6.2] |
Lecture 26 | Mar 28 | Work(cont.) | Chapter 6 [Section 6.3-6.4] |
Lecture 27 | Mar 30 | Work(cont.) | Chapter 6 [Section 6.4-6.5] |
Lecture 28 | Apr 2 | No class | |
Lecture 29 | Apr 4 | Evaluating and Controlling Technology | Chapter 7 [Section 7.1] |
Lecture 30 | Apr 6 | Evaluating and Controlling Technology (cont.) | Chapter 7 [Section 7.2-7.3] |
Lecture 31 | Apr 9 | Evaluating and Controlling Technology (cont.) | Chapter 7 [Section 7.4-7.5] |
Lecture 32 | Apr 11 | Errors, Failures and Risks | Chapter 8 [Section 8.1] |
Lecture 33 | Apr 13 | Errors, Failures and Risks (cont.) | Chapter 8 [Section 8.2-8.3.1] |
Lecture 34 | Apr 16 | Errors, Failures and Risks (cont.) | Chapter 8 [Section 8.3-8.4] |
Lecture 35 | Apr 18 | Professional Ethics and Responsibilities | Chapter 9 [Section 9.1,9.2] |
Lecture 36 | Apr 20 | No Class | |
Lecture 37 | Apr 23 | Quiz 2 | |
Lecture 38 | Apr 25 | Professional Ethics and Responsibilities (cont.) | Software Engineering Code of Ethics and Professional Practice |
Lecture 39 | Apr 27 | Professional Ethics and Responsibilities (cont.) | Appendix A.2 |
Lecture 40 | Apr 30 | Professional Ethics and Responsibilities (cont.) | Chapter 9 [Section 9.3.1-9.3.8] |
Lecture 41 | May 2 | Professional Ethics and Responsibilities (cont.) | Chapter 9 [Section 9.3.9-9.3.15] |
Lecture 42 | May 4 | Final Review | Chapter - 1, 5, 6, 7, 8, 9 |