Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Social, Ethical and Professional Issues
in the Information Age
CSC 540
Topics for Articles & Papers
Internet of (Every)thing(s) from the Sublime to the Ridiculous
http://internetofeverything.cisco.com/sites/default/files/publicsectorimpact/
http://www.thedrum.com/news/2014/01/10/cisco-launches-ad-campaign-back-ceo-s-internet-everything-keynote-ces
https://gizmodo.com/15-idiotic-internet-of-things-devices-nobody-asked-for-1794330999
https://motherboard.vice.com/en_us/article/pgkdm7/when-the-internet-of-things-starts-to-feel-like-the-internet-of-shit
https://www.theregister.co.uk/2017/05/18/cisco_q3_2017_earnings/
Augmented Reality
https://hackernoon.com/big-ar-the-future-of-augmented-reality-c91c267b3d9f
https://thenextweb.com/contributors/2017/09/18/1077433/
https://arstechnica.com/information-technology/2017/05/heads-up-augmented-reality-prepares-for-the-battlefield/
Remote Healthcare
https://www.asme.org/engineering-topics/articles/technology-and-society/remote-health-care-future-medicine
https://www.flexjobs.com/blog/post/top-companies-for-remote-jobs-in-healthcare/
http://www.telegraph.co.uk/wellbeing/future-health/remote-healthcare/
Theory of Computing
https://constraints.wordpress.com/2010/02/10/pnp-consequences/
https://www.reddit.com/r/compsci/comments/2sfqe6/what_happens_to_public_key_cryptography_if_pnp_is/
https://www.quora.com/Would-a-solution-to-P-NP-problem-disrupt-crypto-currencies-like-Bitcoin
The question of whether P=NP is an important topic in
theoretical computer science and applied mathematics. It
seems likely that the answer to the questions P =NP? is
false. However, if it turns out to be true, what would it
mean to everyone else?
Public-Key Encryption
Online Commerce
Banking Transactions
Cryptocurrencies
Microtargeting through Social Networks Microtargeting is (also called micro-targeting or micro-niche targeting) is a marketing strategy that uses consumer data
and demographics to identify the interests of specific individuals or very small groups of like-minded individuals and
influence their thoughts or actions.
http://www.winningcampaigns.org/Winning-Campaigns-Archive-Articles/Micro-Targeting-New-Wave-Political-Campaigning.html
http://mashable.com/2017/10/27/facebook-ads-algorithm-problem/#ykPcFfKibOqO
https://www.icij.org/investigations/paradise-papers/kremlin-owned-firms-linked-major-twitter-facebook-investments-icij/
Catfishing
http://www.toptenz.net/top-10-strangest-stories-catfishing-ever.php
https://www.theatlantic.com/technology/archive/2017/10/hook-line-and-sinker/542748/
https://us.ditchthelabel.org/how-to-spot-a-catfish/?gclid=EAIaIQobChMI4erTh6_n2AIVmEsNCh2XTAZpEAMYASAAEgLEUfD_BwE
Weaponizing IT
Weaponized information is a message or content piece that is designed to affect the recipient's perception
about something or someone in a way that is not warranted. The term implies a target and the intention to
cause harm.
The goal of weaponized information is bringing about a change in beliefs and attitudes and, as a result,
promote behavior that serves the attacker's purpose. Attacks involving weaponized information are
sometimes referred to as cognitive hacking.
http://whatis.techtarget.com/definition/weaponized-information
http://mashable.com/2016/12/05/pizza-gate-fake-news-community-fights/#iA.XmI5ybkqc
http://www.bbc.com/news/blogs-trending-38156985
Artificial Organ Generation/Transplanting We are the Borg
Organs that have been successfully 3D printed and implemented in a clinical setting are either flat, such as skin, vascular, such as blood vessels, or hollow, such as the bladder. When artificial organs are prepared for transplantation, they are often produced with the recipient's own cells.
https://www.circa.com/story/2017/02/03/whoa/could-westworld-ever-be-a-reality-this-doctor-is-already-3d-printing-tissues-and-organs
https://info.izumiinternational.com/advantages-of-bioprinting
https://www.3dnatives.com/en/future-3d-bioprinting1805201741/
Cloning & Designer Babies The New Brave New World
http://www.motherjones.com/politics/2016/02/genome-embryo-crispr-designer-babies/
https://www.wired.com/2015/12/youre-only-human-but-your-kids-could-be-so-much-more/
https://prezi.com/kkpuzff039p1/human-cloning-and-designer-babies/
Personal Genetic Engineering
https://pged.org/genetic-modification-genome-editing-and-crispr/
http://pmj.bmj.com/content/79/931/249
https://www.technologyreview.com/s/600774/top-us-intelligence-official-calls-gene-editing-a-wmd-threat/
http://www.popularmechanics.com/science/a19067/11-crazy-things-we-can-do-with-crispr-cas9/
http://www.the-odin.com/genetic-engineering-home-lab-kit/
This DIY Lab starter kit provides all the
equipment, reagents and materials you need to
get started in molecular biology and genetic
engineering. Also, includes a Genotyping Kit and
supplies from our DIY CRISPR Kit so you can
run your first experiments! Comes with tutorials
explaining the Science and how to use the
equipment.
Computer Technology and the Very Young
https://www.speckaboo.com/blogs/how-we-see-the-world/6-advantages-and-7-disadvantages-of-exposing-young-kids-to-technology
http://www.urbanchildinstitute.org/articles/policy-briefs/infants-toddlers-and-television
https://www.express.co.uk/news/uk/732607/Risk-child-children-warning-toddlers-using-technology-digital-nannies-tablets
http://www.chicagotribune.com/lifestyles/sc-fam-1209-children-diverse-neighborhood-20141202-story.html
Net Neutrality
http://www.chicagotribune.com/business/columnists/reed/ct-biz-net-neutrality-illinois-robert-reed-0121-story.html
https://www.forbes.com/sites/joshsteimle/2014/05/14/am-i-the-only-techie-against-net-neutrality/#4e54987470d5
https://www.theverge.com/2017/12/15/16780564/net-neutrality-is-dead-what-happens-next
https://mlpforums.com/topic/172966-why-net-neutrality-needs-to-go/
Is Facebook Evil?
https://www.pcmag.com/commentary/351623/facebook-a-tool-for-evil
https://www.stuff.co.nz/business/90703587/its-big-powerful-and-multinational--but-is-facebook-evil
https://dube.wordpress.com/2008/03/16/top-10-reasons-facebook-is-evil/
https://thetab.com/uk/2016/09/08/is-facebook-evil-17760
http://www.slate.com/articles/technology/technology/2017/11/facebook_was_designed_to_be_addictive_does_that_make_it_evil.html
Internet Censorship
https://www.nytimes.com/2017/09/13/opinion/cloudflare-daily-stormer-charlottesville.html
http://www.zdnet.com/article/internet-censorship-its-on-the-rise-and-silicon-valley-is-helping-it-happen/
https://www.amnestyusa.org/themes/business-human-rights/internet-censorship/
https://www.theguardian.com/technology/2013/apr/23/web-censorship-net-closing-in
https://www.wired.com/2017/04/internet-censorship-is-advancing-under-trump/
http://cnqzu.com/library/Anarchy%20Folder/Drugs/
https://www.wired.com/2013/12/terminal-cornucopia/
The Internet is Lovely, Dark, and Deep
The deep web, invisible web, or hidden web are parts of the World
Wide Web whose contents are not indexed by standard web search
engines for any reason. The opposite term to the deep web is the
surface web, which is accessible to anyone using the Internet.
Computer scientist Michael K. Bergman is credited with coining the
term deep web in 2001 as a search indexing term. The content of the
deep web is hidden behind HTML forms, and includes many very
common uses such as web mail, online banking and services that
users must pay for, and which is protected by a paywall, such as
video on demand, some online magazines and newspapers, and
many more.
The dark web is a part of the world wide web that requires special
software (e.g.Tor) to access. Once inside, web sites and other
services can be accessed through a browser in much the same way
as the normal web. However, some sites are effectively hidden, in
that they have not been indexed by a search engine and can only be
accessed if you know the address of the site. Special markets also
operate within the dark web called, darknet markets, which mainly
sell illegal products like drugs and firearms, paid for in
cryptocurrency .
https://www.whoishostingthis.com/blog/2017/03/07/tor-deep-web/
https://www.ranker.com/list/creepy-dark-web-stories/jenniferlennon
https://www.techadvisor.co.uk/how-to/internet/dark-web-3593569/
https://www.quora.com/What-is-the-deep-dark-web-and-how-do-you-access-it
http://metro.co.uk/2015/07/08/12-scary-things-which-happen-when-you-go-on-the-dark-web-5285640/
Quantum Computing The Dark Side
The dark side of quantum computers. ... The era of fully fledged quantum computers threatens to destroy internet security
as we know it. Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum
computers, as cryptographers now describe.
https://www.sciencedaily.com/releases/2017/09/170913192957.htm
http://www.sciencenewsline.com/news/2017091416420022.html
http://www.songs.myodia.org/search/michio-kaku:-the-dark-side-of-technology.html
https://singularityhub.com/2016/10/10/massive-disruption-quantum-computing/ https://webcache.googleusercontent.com/search?q=cache:T0v7A0LUXTUJ:https://www.forbes.com/sites/jasonbloomberg/2017/08/11/this-is-why-quantum-computing-is-more-dangerous-than-you-realize/+&cd=8&hl=en&ct=clnk&gl=us
The Singularity
https://io9.gizmodo.com/5534848/what-is-the-singularity-and-will-you-live-to-see-it
https://singularityhub.com/2017/03/31/can-futurists-predict-the-year-of-the-singularity/#sm.00001o42p5dnptf74xbr726t7mw2e
https://www.youtube.com/watch?v=8MVrtJdrYtA https://webcache.googleusercontent.com/search?q=cache:sRe4Kih1VowJ:https://www.forbes.com/sites/gregsatell/2016/06/03/3-reasons-to-believe-the-singularity-is-near/+&cd=9&hl=en&ct=clnk&gl=us
Bioinformatics
http://journalofethics.ama-assn.org/2001/03/gnth1-0103.html
https://csce.ucmss.com/cr/books/2017/LFS/CSREA2017/EEE3568.pdf
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1326447/
https://www.peacepalacelibrary.nl/ebooks/files/UNIDIR_pdf-art115.pdf
Autonomous Robotic Surgery
http://www.cnn.com/2016/05/12/health/robot-surgeon-bowel-operation/index.html
https://spectrum.ieee.org/the-human-os/biomedical/devices/the-most-cringe-inducing-surgical-robots-from-ieees-intelligent-robots-conference
http://www.telegraph.co.uk/news/science/science-news/11378206/Surgical-robot-carries-out-first-operation-in-England.html
Zero Privacy Will 2084 be Like 1984 ?
https://www.newyorker.com/books/page-turner/so-are-we-living-in-1984
https://prezi.com/jfvnocendx9p/1984-invasion-of-privacy/
http://www.cnn.com/2013/08/03/opinion/beale-1984-now/index.html
http://www.foxbusiness.com/features/2013/07/31/have-no-privacy-get-over-it.html
http://www.nbcnews.com/id/15221095/ns/technology_and_science-privacy_lost/t/privacy-under-attack-does-anybody-care/#.WmPYy2O5-R5
Computational Photography
Computational Photography is the convergence of computer graphics, computer vision and photography. Its role is to overcome the limitations of the traditional camera by using computational techniques to enable new and enhanced ways of capturing, representing, and interacting with visual stimuli.
http://graphics.cs.cmu.edu/courses/15-463/
https://graphics.stanford.edu/talks/compphot-publictalk-may08.pdf
https://lhncbc.nlm.nih.gov/project/c3pi-computational-photography-project-pill-identification
http://web.media.mit.edu/~raskar/photo/
When The Virtual Becomes Real What will we be Missing?
http://www.albertopugnale.com/2016/07/19/how-virtual-becomes-real-2016/
http://www.bbc.com/news/technology-33149583
https://growingleaders.com/blog/virtual-becomes-reality/ http://webcache.googleusercontent.com/search?q=cache:UQDf9ZSuaP4J:www.lse.ac.uk/alumni/LSEConnect/pdf/winter2012/VirtualBecomesReal.pdf+&cd=4&hl=en&ct=clnk&gl=us
Technology Addiction
Technology addiction — sometimes called Internet addiction, Internet use disorder (IUD) or Internet addiction disorder (IAD) — is a fairly new phenomenon. It’s often described as a serious problem involving the inability to control use of various kinds of technology, in particular the Internet, smartphones, tablets and social networking sites like Facebook, Twitter and Instagram.
https://www.addiction.com/addiction-a-to-z/technology-addiction/
https://www.huffingtonpost.com/topic/technology-addiction
http://theinstitute.ieee.org/ieee-roundup/blogs/blog/medical-experts-say-addiction-to-technology-is-a-growing-concern
Cyber-Bullying
https://www.stopbullying.gov/cyberbullying/what-is-it/index.html
https://www.theatlantic.com/magazine/archive/2013/03/how-to-stop-bullies/309217/ https://americanspcc.org/bullying/statistics-and-information/?gclid=EAIaIQobChMI9aXD2fjn2AIVVEsNCh3EjAqwEAAYAyAAEgIVNPD_BwE
Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
The Dark Side of Minecraft
https://monman11.com/the-dark-side-of-minecraft-shocking-stories-from-a-14-year-old-gamer/
http://www.minecraftforum.net/forums/off-topic/general-gaming/456174-the-dark-side-of-minecraft
Is Google Making Us Stupid?
https://www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/306868/
http://web.bend.k12.or.us/erin.werner/Werner/10_Honors_1_files/Google%20Abridged.pdf
https://campustechnology.com/Articles/2009/03/18/Response-to-Nicholas-Carr-Question-Is-Google-Making-Us-Stupid.aspx
https://www.huffingtonpost.com/entry/google-changes-thinking_us_55dc8069e4b04ae497046fa6
The Digital Dark Ages
Digital dark age. The digital dark age is the perception of a possible future situation where it will be difficult or impossible to read historical electronic documents and multimedia, because they have been recorded in an obsolete and obscure file format.
http://www.bbc.com/news/science-environment-31450389
https://www.pri.org/stories/2018-01-01/scientists-warn-we-may-be-creating-digital-dark-age
Artificial Artisans AI & Creativity
https://futurism.com/a-new-ai-can-write-music-as-well-as-a-human-composer/
https://news.artnet.com/art-world/rutgers-artificial-intelligence-art-1019066
https://www.digitaltrends.com/cool-tech/japanese-ai-writes-novel-passes-first-round-nationanl-literary-prize/
Google Street View Wi-Fi Sniffing
http://www.dailymail.co.uk/sciencetech/article-2292624/Google-hit-7M-fine-wifi-snooping-Street-View-cars-intercepted-emails.html
https://www.wired.com/2014/04/threatlevel_0401_streetview/
Diversity Issues in Information Technology The Global Digital Divide
http://diverseeducation.com/article/93647/
https://www.forbes.com/sites/bonniemarcus/2015/08/12/the-lack-of-diversity-in-tech-is-a-cultural-issue/#457bbf579a21
https://scholarworks.gvsu.edu/cgi/viewcontent.cgi?article=1009&context=colleagues
Self-Driving Cars Technical & Legal Issues
Driverless cars are supposed to be much safer than cars driven by people because they don't make human errors. ... But lawyers, academics and the car's designers say none of these issues are likely to prevent self-driving cars from hitting the road, because current liability laws already provide some guidance.
https://www.nytimes.com/2014/05/14/upshot/when-driverless-cars-break-the-law.html
http://www.allenovery.com/SiteCollectionDocuments/Autonomous-and-connected-vehicles.pdf
https://www.nytimes.com/2017/06/07/technology/autonomous-car-technology-challenges.html
Syncing Traffic Self-Driving Cars in the City
https://www.fastcompany.com/40477566/how-new-york-can-use-self-driving-cars-to-improve-mobility-not-clog-traffic
https://www.youtube.com/watch?v=4pbAI40dK0A
https://www.pcmag.com/article/351871/driverless-cars-can-they-really-eliminate-traffic http://www.dailymail.co.uk/sciencetech/article-2990431/See-world-eyes-CAR-High-resolution-maps-reveal-self-driving-vehicles-rapidly-navigate-busy-roads.html
Predictive Policing
https://facebookjustice.wordpress.com/2011/12/15/predictive-policing/
http://www.sciencemag.org/news/2016/09/can-predictive-policing-prevent-crime-it-happens
https://www.rand.org/content/dam/rand/pubs/research_reports/RR200/RR233/RAND_RR233.sum.pdf
https://www.nature.com/news/reform-predictive-policing-1.21338
https://www.usatoday.com/story/opinion/policing/spotlight/2016/12/02/predictive-policing-violates-more-than-protects-column/94569912/
Online Voting What Could Possibly Go Wrong?
https://www.usenix.org/sites/default/files/conference/protected-files/enigma16_slides_halderman.pdf
https://www.rsa.com/en-us/blog/2016-04/internet-votingwhat-could-possibly-go-wrong
https://engineering.stanford.edu/magazine/article/david-dill-why-online-voting-danger-democracy
https://www.livescience.com/24521-online-voting-risks.html
https://www.theguardian.com/technology/2015/mar/30/why-electronic-voting-is-not-secure
Voter Records Leak Exposes 198 Million Americans
http://money.cnn.com/2017/06/19/technology/voter-data-leaked-online-gop/index.html
https://www.forbes.com/sites/leemathews/2017/06/19/gop-firm-leaked-info-200-million-americans/#1866970579ff
https://www.infosecurity-magazine.com/news/nearly-200m-voter-records-leaked/
https://gizmodo.com/gop-data-firm-accidentally-leaks-personal-details-of-ne-1796211612
Personal information of almost 200 million registered U.S. voters was accidentally exposed online due to an improperly
configured security setting, security firm UpGuard revealed on Monday. The leaked information, compiled by Republican data
firm Deep Root Analytics and two other Republican contractors, included names, birth dates, addresses, voter registration
details and social media posts.
Fragility of Infrastructure Technology
https://techcrunch.com/2015/01/27/connected-world-fragility/
http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1051&context=jss
http://www.resilience.org/stories/2006-08-10/fragility-global-trade-and-infrastructure/
https://news.clearancejobs.com/2016/02/09/our-nations-critical-infrastructure-is-both-vulnerable-and-fragile/
https://www.slideshare.net/smart_facility/smart-seminar-series-how-resilient-are-our-infrastructure-systems
Will the Technological Revolution
Save Us from the Industrial Revolution?
https://www.weforum.org/press/2017/09/technology-tipping-point-that-could-save-the-planet-within-humanitys-grasp/
https://www.huffingtonpost.com/julia-holland/will-the-next-generation-_b_905613.html
https://www.bbvaopenmind.com/en/technologies-that-can-save-the-environment/
https://soapboxie.com/social-issues/SAVE-THE-MOTHER-EARTH
Cloud Mining
Bitcoin Miners run software to find the key that will open a digital padlock. Once their computer finds it, the box pops open and the transactions are verified. For finding that "needle in a haystack" key, the miner gets a reward of newly generated bitcoins. Cloud Mining is the process of bitcoin mining utilizing a remote datacenter with shared processing power. This type of cloud mining enables users to mine bitcoins or alternative cryptocurrencies without managing the hardware.
https://www.wikihow.com/Mine-Bitcoins
http://www.techradar.com/how-to/computing/how-to-mine-bitcoins-1308789
https://www.coindesk.com/information/cloud-mining-bitcoin-guide/
https://www.bitcoinmining.com/cloud-mining-profitable/
https://www.reddit.com/r/Bitcoin/comments/6gbf9x/cloud_mining_is_a_scam/
Gaming Disorder
Gaming disorder is a pattern of persistent or recurrent gaming behavior online or offline, manifested by impaired control over gaming, increasing priority given to gaming to the extent that gaming takes precedence over other life interests and daily activities and continuation or escalation of gaming despite the occurrence of negative consequences.
http://www.who.int/features/qa/gaming-disorder/en/
https://www.usatoday.com/story/tech/nation-now/2017/12/27/video-gaming-disorder-could-soon-recognized-world-health-organization/985069001/
https://www.psychguides.com/guides/video-game-addiction-treatment-program-options/
Virtual Assistants
https://medium.freecodecamp.org/the-number-1-reason-virtual-assistants-will-go-completely-viral-c4a8bb20e262
http://factor-tech.com/connected-world/9549-forget-siri-the-virtual-assistants-of-the-future-will-transform-the-way-we-work-and-live/
https://www.computerworld.com/article/3078829/artificial-intelligence/these-three-virtual-assistants-point-the-way-to-the-future.html
https://www.computerworld.com/article/2954669/enterprise-applications/ai-powered-assistants-step-into-the-enterprise.html
Onliner - the World's Largest SpamBot
A new spambot called Onliner has been discovered which can bypass spam filters and target 711 million email addresses, as noted by ZDNet. ... Onliner has the required details for about 80 million accounts which are then used to spam the remaining 630 million email addresses.
http://securityaffairs.co/wordpress/62494/data-breach/onliner-spambot.html
http://csclab.murraystate.edu/~bob.pilgrim/540/readings/Heres_Why_Onliner_Spambot_Threat_Is_Dangerous.pdf
https://www.troyhunt.com/inside-the-massive-711-million-record-onliner-spambot-dump/
NSA's Ragtime Program Ragtime or RAGTIME is the code name of four secret surveillance programs conducted by the National Security Agency (NSA) of the United States. These programs date back to at least 2002 and were revealed in March 2013 in the book Deep State: Inside the Government Secrecy Industry, by Marc Ambinder and D.B. Grady.
http://www.zdnet.com/article/ragtime-program-appear-in-nsa-leaked-files/
https://www.rt.com/usa/411352-ragtime-nsa-surveillance-americans/
http://www.sangbe.com/article/82180.html
Total Information Awareness T is for...Terrorist
Total Information Awareness (TIA) is the name of a massive U.S. data mining project focused on scanning travel, financial
and other data from public and private sources with the goal of detecting and preventing transnational threats to national
security. TIA has also been called Terrorism Information Awareness. The program was part of the Homeland Security Act and,
after its creation in January 2003, was managed by the Defense Advanced Research Projects Agency (DARPA). In September
2003, U.S. Congressional negotiators agreed to terminate the program and ceased funding. in 2006, however, news agencies
reported that software developed for it had been shifted to other agencies, specifically the National Security Agency (NSA).
http://searchsecurity.techtarget.com/definition/Total-Information-Awareness
https://www.globalsecurity.org/security/systems/tia.htm
https://epic.org/privacy/profiling/tia/
https://www.nap.edu/read/12452/chapter/16
http://www.motherjones.com/politics/2014/06/how-fourth-amendment-not-protect/
The Marketing of Your Browsing History
http://www.zdnet.com/article/fcc-chairman-browsing-history-freedom-of-information/
http://csclab.murraystate.edu/~bob.pilgrim/540/readings/What_to_expect_providers_sell_your_Web_browser_history.pdf
https://arstechnica.com/tech-policy/2017/03/senate-votes-to-let-isps-sell-your-web-browsing-history-to-advertisers/
The Global Terrorist Watchlist
https://www.theguardian.com/world/2014/jul/24/us-terrorism-watchlist-work-no-fly-list
https://www.wired.com/2016/06/fbi-watch-list-prevented-orlando-heres-works/
https://www.huffingtonpost.com/2014/07/25/terrorist-watch-list_n_5617599.html
https://www.ice.gov/doclib/project-shield/pdf/shield-america-brochure.pdf
https://theintercept.com/document/2014/07/23/march-2013-watchlisting-guidance/
http://www.dailymail.co.uk/sciencetech/article-3668176/Global-terror-watchlist-exposed-Details-2-2-MILLION-suspects-leaked-online.html
http://www.businessinsider.com/how-to-be-on-fbi-watch-list-2017-2
The Compleat Lifecycle of Consumer IT
http://enme.umd.edu/ESCML/Papers/ObsCPMT.pdf
https://www.cta.tech/News/Blog/Articles/2014/September/The-Life-Expectancy-of-Electronics.aspx
https://www.tieto.com/product-development/mobile-devices-and-consumer-electronics/product-creation
https://www.cnet.com/news/the-environmental-pitfalls-at-the-end-of-an-iphones-life/
Summary
https://www.wikihow.com/Write-a-News-Article
https://business.tutsplus.com/articles/11-ap-style-guide-rules-that-are-easy-to-mess-up--fsw-27489
https://quizlet.com/18847413/types-of-newspaper-articles-flash-cards/
Adopt-A-Topic - Choose an approved topic to research.
Individual Writing Assignment - You will write an article on your selected topic. It can be in the form of a news story (facts only) , ar a column (facts and opinion),...in rare cases (with special permission) it could be a review or a gonzo piece.
Group Oral Presentation - Between two and four students in each group. You will be graded on your presentation content and style. Also your attendance during other student presentations is expected and will be graded.
Class Participation - Occasionally there will be in-class activities to be completed and submitted by the end of the class.
Topics Tests - There will be 2-3 tests covering the topics covered in the individual writing assignments.
Augmented Reality
Computational Photography
Remote Healthcare Artificial Organ Generation Cloning & Designer Babies
Personal Genetic Engineering Autonomous Robotic Surgery
Bioinformatics
Theory of Computing
Quantum Computing
Microtargeting Social Networks
Weaponizing IT
Is Facebook Evil?
Online Voting
Catfishing Cyber-Bullying
Internet Censorship Dark Side of Minecraft Dark Web - Deep Web
The Singularity Artificial Artisans
Net Neutrality The Global Terrorist Watchlist
NSA's Ragtime Program Predictive Policing
Total Information Awareness Google Street View Wi-Fi
Sniffing
Technology & Children When Virtual Becomes Real
Technology Addiction Is Google Making Us Stupid?
Gaming Disorder
Zero Privacy Marketing Browser History
Voter Records Leak Onliner - Spambot
The Digital Dark Ages Diversity Issues in IT
Fragility of Infrastructure Will Technology Save Us LifeCycle of Consumer IT
Virtual Assistants Self-Driving Cars Syncing Traffic
Internet of Things