|Instructor:||Dr. Adrienne Bloss||Office Hours:||MTWTh 10:45-11:45|
|Office:||Administration 110||Also by appointment|
Course Objectives: The general objectives of the Computer Science Senior Seminar are to increase the student's ability to do the independent reading and research necessary to keep up with developments in the computing field, to increase the student's experience and skills in written and oral communications, and to increase the student's understanding of the ethical responsibilities of computing professionals. These objectives are met through a seminar style course that focuses on an area or areas of computer science not in the regular curriculum. This year the seminar is subtitled "Computers and Society," providing an introduction to the many influences of computers in our society.
Cryptography and Network Security, Principles and Practice, 4th
Edition, by William Stallings, Pearson Prentice-Hall, 2006.
A variety of other resources will be identified and/or distributed in class.
Course Overview: The course will touch on a range of topics in the overlapping areas of cryptography and security and social and ethical issues. Some of the topics will be selected and led by the instructor; others will be selected and led by one or more students. Each student will select one topic in each area to present to the seminar (possible topics will be discussed in class). Each student will have one class period for his or her topic and must provide at least the following:
The social/ethical topic has the following additional requirements:
Tentative schedule outline, subject to change with notice:
|Week of||Topic||Led by|
|Jan 15||Introduction to security and cryptography -- classical encryption||Instructor|
|Jan 22||More introduction to cryptography -- block ciphers, DES/AES||Instructor|
|Jan 29||More introduction to cryptography -- public key encryption||Instructor|
|Feb 5||Topics in security and cryptography||Students|
|Feb 12||Topics in security and cryptography||Students|
|Feb 19||Topics in security and cryptography||Students|
|Feb 26||Wrap up security and cryptography; midterm exam||Instructor|
|March 5||** Spring Break **|
|March 12||Introduction to computers and society||Instructor|
|March 19||More introduction to computers and society||Instructor|
|March 26||Topics in computers and society||Students|
|April 2||Topics in computers and society||Students|
|April 9||Topics in computers and society||Students|
|April 16||Course wrap up; papers due||Instructor|
Attendance Policy: Class attendance is a very important aspect of a student's success in this course. The student is expected to attend every class and is accountable for any missed classes.
Grading Policy: The course grade will
be based on a midterm exam, a final exam, homework assignments and/or quizzes,
two topic presentations, and a paper.
The course grade will be
determined using the following
Make-up Policy: Everyone is expected to take the midterm and final exam at the scheduled time. Make-ups will be given only for legitimate, documented absences that the instructor has been notified of ahead of time. Make-up tests, if given, may be oral.
Late Policy: Unless otherwise specified, assignments will not be accepted late. If you must miss a class during which an assignment is due, the assignment must be turned in ahead of time unless special arrangements have been made.
Academic Integrity: All quizzes, tests and exams are to be the work of the individual student unless otherwise specified by the instructor. Students are encouraged to work together on homework assignments, but it is never permissible for a student to turn in work that is substantially someone else's as his or her own. In group work, all members of the group are expected to contribute substantially to the final product. Failure to do so while accepting the group grade is a violation of academic integrity. Students are strongly encouraged to seek help from the instructor with any aspect of the course. Always remember that using someone else's work or ideas as your own is plagiarism and is a violation of academic integrity.
Computer Use Policies: All students must abide by the Computer Use policies of Roanoke College. Failure to do so will result in involuntary withdrawal from the course.