Upload
miles-gilmore
View
212
Download
0
Embed Size (px)
Citation preview
J. Chansavang
Possible Research Topics for CS-306 Taken from A Gift of Fire by Sara Basse
Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics are categorized under each of these
areas and are followed by the chapter number in A Gift of Fire under which
they can be located. *Refer to the accompanying document for additional information
on each topic.
Major Areas Affected by Technology• Economy • Workplace• Society• Environment• Government/Politics• Laws/Regulations
Graphical Representation
EconomyArtificial Intelligence (1)Automated Systems (1)Robotics (1)Censorship on the Global Net (3)Online Gambling (7)The Global Economy (7)The Neo-Luddite View (7)
WorkplaceE-Commerce (1)Monitoring Employee Emails/Web Use (2)
Net Neutrality (6)Telecommuting (6)Software and Design Testing (8) Computer Ethics (9)Ethical Views on Technology (9)
SocietyBlogs (1)Cell Phones (1)Wireless phones and GPS (1)
Social Networking (1)
Tools for the Disabled (1)
Distance Education (1)
Identification and Biometrics (1)
Privacy on the Web (2)
Video Surveillance (2)
DNA Databases (2)Parental Controls (2)
Video Games and Violence (3)
Society, Cont.Anonymity (3)Gender/Ethics Issues (3)
Health Information on the Web (3)
Free Software (4)Computers and Community (7)
The End of the Human Race? (7)
50 Years From Now (7)
Computers in Schools (8)
Computers in Restaurants (8)
Are Libraries and Books Obsolete? (8)
Targeted Advertising (9)
EnvironmentFuture of Electronic Commerce (6)
Computers and the Environment (6)
Cyberspace Communities (7)Our Dependency on Computers (8)
Government/PoliticsAccess to Public Records (2)Government Surveillance on Communication (2)
Political Activism on the Net (3) Technological Responses to Terrorism (5)
Electronic and Internet Voting (6)Information Warfare (9) Government Surveillance of the Internet (9)
Laws/RegulationsPrivacy Regulations in Other Countries (2)
Hate Speech on the Internet (3)Spam (3) File Copying/Sharing (4) Music/Movies Copyright Battles (4)
Computers in Law Enforcement (5)
Hacking (5)Identity Theft (5)Scams and Forgery(5)
Pick A Good One!