skip to main content
10.1145/1047344.1047464acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

Effective incorporation of ethics into courses that focus on programming

Published:23 February 2005Publication History

ABSTRACT

This paper discusses some of the issues involved in incorporating ethics material into programming courses. Incorporating ethics into such courses raises particular challenges because of the time-intensive nature of the courses and because of the difficulty of finding material that is both relevant to the course and comprehensible to the students. The paper presents four case studies that we have used successfully when incorporating ethics material into our own programming courses.

References

  1. Association for Computing Machinery. (1997). ACM code of ethics and professional conduct.Google ScholarGoogle Scholar
  2. Association for Computing Machinery, & Institute for Electrical and Electronics Engineers. (1999). Software engineering code of ethics and professional practice.Google ScholarGoogle Scholar
  3. Association for Computing Machinery and Institute of Electrical and Electronics Engineers - Computer Science Joint Curriculum Task Force. (1990). Computing curriculum '91.Google ScholarGoogle Scholar
  4. Bowyer, K. (2000). Video resources for use in teaching ethics and computing. In Proceedings of the Thirty-first SIGCSE Technical Symposium on Computer Science Education, Austin, TX. pp. 217--221. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Collins, W. R., Miller, K. W., Spielman, B. J., & Wherry, P. (1994). How good is good enough?: An ethical analysis of software construction and use. Communications of the ACM, 37(1), 81--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Computing Accreditation Commission, Accreditation Board for Engineering and Technology. (2002). Criteria for accrediting computing programs, 2003-2004.Google ScholarGoogle Scholar
  7. DeGuere Jr., P. (Writer), & R. Hardy (Director) (2003). Standards of conduct. In D. P. Bellisario (Producer), JAG: Belisarius Productions.Google ScholarGoogle Scholar
  8. Epstein, R. G. (1997). The case of the killer robot: Stories about the professional, ethical, and societal dimensions of computing. New York: Wiley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Granger, M. J., Adams, E. S., Björkman, C., Gotterbarn, D., Juettner, D. D., Martin, C. D., et al. (1997). Using information technology to integrate social and ethical issues into the computer science and information systems curriculum: Report of the iticse '97 working group on social and ethical issues in computing curricula. Outlook, 25(4), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Huff, C., & Martin, C. D. (1995). Computing consequences: A framework for teaching ethical computing. Communications of the ACM, 38(12), 75--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lelewer, D. A. (1994). A seminar course in computer ethics. In Proceedings of the Twenty-fifth SIGCSE Technical Symposium on Computer Science Education, Phoenix, AK. pp. 253--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Leveson, N., & Turner, C. S. (1993). An investigation of the Therac-25 accidents. IEEE Computer, 26(7), 18--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Martin, C. D., & Weltz, E. Y. (1999). From awareness to action: Integrating ethics and social responsibility into the computer science curriculum. Computers and Society, 29(2), 6--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Morgan, T., & Roberts, J. (2002). An analysis of the patriot missile system, from http://seeri.etsu.edu/SECodeCases/ ethicsC/PatriotMissile.htmGoogle ScholarGoogle Scholar
  15. Schulze, K. G., & Grodzinsky, F. S. (1997). Teaching ethical and social issues in cs1 and cs2. In Proceedings of the Twenty-Eighth SIGCSE Technical Symposium on Computer Science Education, San Jose, CA. pp. 6--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Spinello, R. A. (2003). "It's never right to copy software". In Case studies in information technology ethics (pp. 59-62). Upper Saddle River, NJ: Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Townsend, G. (1999). TheTenthStrand == 3 * EthicalDebates + Solution. In Proceedings of the Thirtieth SIGCSE Technical Symposium on Computer Science Education, New Orleans, LA. pp. 17--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Wahl, N. J. (1999). Yaatce--yet another approach to teaching computer ethics. In Proceedings of the Thirtieth SIGCSE Technical Symposium on Computer Science Education, New Orleans, LA. pp. 22--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Werth, L. H. (1997). Getting started with computer ethics. In Proceedings of the Twenty-eighth SIGCSE Technical Symposium on Computer Science Education, San Jose, CA. pp. 1-5.Bowman, B., Debray, S. K., and Peterson, L. L. Reasoning about naming systems. ACM Trans. Program. Lang. Syst., 15, 5 (Nov. 1993), 795--825. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Effective incorporation of ethics into courses that focus on programming

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCSE '05: Proceedings of the 36th SIGCSE technical symposium on Computer science education
      February 2005
      610 pages
      ISBN:1581139977
      DOI:10.1145/1047344

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 February 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,595of4,542submissions,35%

      Upcoming Conference

      SIGCSE Virtual 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader