CST 300: Graduation Writing Assessment for Computing and Design

Course Description

This course develops critical reading and writing skills for the Computing, Design, and Technology fields. Students learn to adapt their writing for different audiences and purposes while adhering to disciplinary conventions.

The curriculum focuses on expository and academic writing, professional communication, source evaluation and selection, and effective communication with diverse audiences. Emphasis is placed on clarity, structure, argument development, and evidence-based analysis.

Prerequisites: GE Area 1A, 1B, and 1C with a C- or better, and Junior or Senior Standing

University Requirement: GWAR – Graduation Writing Assessment Requirement

Typically Offered: Fall, Spring

Units: 3

Final Project: Ethics Essay

The culminating assignment for CST 300 was an ethics-based analytical essay addressing the question: Should technology companies be legally compelled to include encryption backdoors in their products?

Project Overview

This essay examined the ethical, legal, and technical implications of mandating encryption backdoors for law enforcement access. The paper analyzed arguments related to national security, individual privacy rights, cybersecurity risks, and corporate responsibility.

Drawing from academic research, legal analysis, and industry case studies, the essay evaluated competing perspectives on whether compelled access enhances public safety or undermines digital security. Particular attention was given to the technical reality that introducing intentional vulnerabilities can weaken systems for all users, not just targeted individuals.

Key Themes Explored

Conclusion

The essay concluded that legally mandated encryption backdoors introduce systemic security risks that outweigh potential investigative benefits. Strong encryption protects not only individual privacy but also financial systems, critical infrastructure, and national security. Compromising encryption standards may create broader vulnerabilities that could be exploited by malicious actors.

Skills Developed

Reflection

This project strengthened my ability to analyze controversial technology issues through both ethical and technical lenses. It required careful consideration of real-world trade-offs and reinforced the importance of evidence-based reasoning in professional and academic communication.

The experience improved my confidence in presenting complex computing topics in a structured and persuasive format, an essential skill for leadership and decision-making roles in technology.