CS:5980:001 Topics in Computer Science III: Computing Research Ethics
12:30-1:20 M B11 MLH (MacLean Hall)
Sriram V. Pemmaraju
101G MLH, firstname.lastname@example.org, 319-353-2956
Office Hours: 1:30-2:30 M, 10:30-11:30 W, 2:00-3:00 F (and by appointment)
Alberto M. Segre
14D MLH, email@example.com, 319-335-1713
Office Hours: by appointment
Course website: http://www.cs.uiowa.edu/~sriram/5980/spring16/
Department website: http://www.cs.uiowa.edu/
Course Syllabus: Syllabus
Weekly Readings and Assignments
Week 1: 5/25-5/29 Human subjects research and the role of the IRB
Main Reading: "Experimental evidence of massive-scale emotional contagion through
social networks," Kramer, Guillory, and Hancock. PNAS June 2014.
Assignment: Complete the online HSR training by class time on Monday, Feb 1.
Week 2: 2/1-2/5 The Ethics of Authorship
``The Ethics of Authorship: Feature Overview--How Should Authorship Be Decided?''
Katie Cottingham, March 2001.
Make sure you read the essays by the 4 "authorship experts" in response to the
hypothetical authorship dilemma prsented in the article.
Week 3: 2/8-2/12 The Ethics of Peer Reviewing
These are from the Office of Research Integrity, US Dept of Health and Human Services.
Week 4: 2/15-2/19 Rights and Responsibilities of Graduate Students as Advisees and Faculty as Advisors
- The Ph.D Experience, Mihir Bellare CS Prof at UCSD https://cseweb.ucsd.edu/~mihir/phd.html.
- Matt Might, CS Prof at Utah has lots of excellent advice for graduate students. Look under "Graduate School" in
this index of article: http://matt.might.net/articles/. Some example
articles that seem most relevant are: "12 resolutions for grad students," "The 5+5 Commandments of a Ph.D," "10 easy ways to fail a Ph.D."
Week 5: 2/22-2/26 Data Management: Anonymity and Privacy
Week 6: 2/29-3/4 Data Management: Anonymity and Privacy
- k-anonymity: a model for protecting privacy,
Latanya Sweeney, International Journal on Uncertainty, Fuzziness and
Knowledge-based Systems, 10 (5), 2002; 557-570
- Achieving k-anonymity privacy protection using generalization and suppression, Latanya Sweeney, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; 571-588.
Week 7: 3/7-3/11 Ethics of Creating Software
Week 8: 3/21-3/25 The ethics of using animals in research
- Some Thoughts on Animal Experimentation, David S. Favre,
2 Animal L. 161 (1996).
- Of Mice and Ethics,
C.T. Streba, C.C. Vere, Cristina Miscu, D.I. Gheonea, Larisa Sandulescu, T. Ciurea, I. Rogoveanu, A. Saftoiu, Current Health Sciences Journal,
Vol. 38, No. 1, 2012 January March.
- Animal ethics in Cardiovascular Research,
Marisol Ruiz-Meana, Elizabeth A. Martinson,
David Garcia-Dorado, and Hans Michael Piper.
Cardiovascular Research (2012) 93, 1–3
- Open Science and Reporting Animal Studies: Who’s
Jonathan A. Eisen, Emma Ganley, Catriona J. MacCallum,
PLOS Biology, Jan 2014 12(1).
Week 10: 4/4-4/8 Algorithmic Bias: Part I
Weeks 11 and 12: 4/11-4/15, 4/18-22 Algorithmic Bias: Part II
- Unequal Representation and Gender Stereotypes in Image Search Results for Occupations, Matthew Kay, Cynthia Matuszek, and
Sean A. Munson, CHI 2015 (best paper).
- Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination,
Amit Datta, Michael Carl Tschantz, and Anupam Datta,
Proceedings of Privacy Enhancing Technologies Symposium, 2015.
Week 13: 4/25-4/29 Data Control, Encryption, and Privacy
Testimony for House Judiciary Committee Hearing on “The Encryption Tightrope: Balancing Americans’ Security and Privacy by Susan Landau, March 2016. Read until "The Role of Smart Phones."
Burr And Feinstein Release Their Anti-Encryption Bill... And It's More Ridiculous Than Expected, Tech Dirt, April 2016.