Search result: Catalogue data in Autumn Semester 2023
Science in Perspective In “Science in Perspective”-courses students learn to reflect on ETH’s STEM subjects from the perspective of humanities, political and social sciences. Only the courses listed below will be recognized as "Science in Perspective" courses. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Type B: Reflection About Subject-Specific Methods and Contents Subject-specific courses. Particularly relevant for students interested in those subjects. All these courses are also listed under the category “Typ A”, and every student can enroll in these courses. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
D-MAVT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Number | Title | Type | ECTS | Hours | Lecturers | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
851-0742-00L | Contract Design I You can find all course materials and the most recent announcements on Moodle. Please log in to Moodle using your ETH or UZH credentials. Then search for "Contract Design I (851-0742-00L; Fall 2023)" and enroll. The password is "ContractDesign01". It is NOT a legal drafting class focused on contractual language. Number of participants limited to 160. Max 80 ETHZ and 80 UZH Students | W | 3 credits | 2V | A. Stremitzer, A. Tacconelli | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | Contract Design I is taught by Professor Stremitzer and aims to bridge the gap between economic contract theory, contract law, and the writing of real-world contracts. In this course, we take a systematic approach to contract design. This means we first analyze the economic environment in which a transaction takes place and then engineer contracts that achieve the desired outcome. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | Contracts are agreements between parties to engage in transactions. A good contract creates value by giving parties the right incentives to meet their objectives. A good contract designer scrutinizes the economic situation in which parties find themselves and tailors the contract to the challenges at hand. To help you become sophisticated contract designers, we draw from insights for which more than half a dozen Nobel Prizes were awarded in the past two decades and transfer them to the art of writing real-world contracts. In other words, Contract Design will provide you with analytical tools to design contracts that help you be better lawyers, business leaders, and startup founders. We will cover topics such as moral hazard, adverse selection, elicitation mechanisms, relationship-specific investments, and relational contracting and apply the theoretical insights to real-life case studies ranging from purchases & sales of assets, oil & gas exploration, movie financing, production & distribution, construction & development, M&A deals, venture capital financing, to executive compensation and many other types of transactions. The course follows a flipped-classroom model: You will watch learning videos specifically produced for this course ahead of class. We will use class time to discuss real-world case studies. The videos will be made available before the lecture each week and need to be watched ahead of coming to class. Computer-graded quizzes at the beginning of each class will test students’ understanding of the concepts introduced in the videos. As the emphasis of this class is on class discussion, attendance is mandatory. Absent important reasons, you cannot miss class more than twice. The lectures will be recorded but only made available to those who miss lectures with excused absence. For ETH students: Your grade will consist of two parts: 1) You will take weekly computer-based quizzes during class time. Thus, it is important that you attend the lectures to be able to finish the quizzes and pass this course. 2) You compose short responses to take-home questions on case studies we assign and upload them ahead of class (Pass/Fail). Note that UZH and UNISG students enrolling in this course need to earn more ECTS for completing this course than ETH students (due to curricula reasons). This is why UZH and UNISG students must complete a written assignment in addition to the weekly quizzes and take-home questions. UZH students also have to complete an additional group project. UZH and UNISG students should check out the description of the class at their respective home institutions. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Lecture notes | Handouts, prerecorded videos, slides, case studies, and other materials available on a dedicated webpage: contractdesign.org. Access to this webpage is free of charge for ETH students as ETH purchased a license for ETH students. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | Attendance is mandatory. You are only allowed to miss two lectures unless there are special circumstances. Contract Design I is available to ETH students through the Science in Perspective (SiP) Program of D-GESS. This course is particularly suitable for students of D-ARCH, D-BAUG, D-CHAB, DMATH, D-MTEC, D-INFK, and D-MAVT. If you have any questions regarding the course, please write an email to the teaching assistants, Lucas Gericke (lucas.gericke@gess.ethz.ch) or Serge von Steiger (serge.vonsteiger@gess.ethz.ch). | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
851-0738-01L | The Role of Intellectual Property in the Engineering and Technical Sector Particularly suitable for students of D-BAUG, D-BIOL, D-BSSE, D-CHAB, D-ITET, D-MAVT. | W | 2 credits | 2V | K. Houshang Pour Islam | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | The lecture gives an overview of the fundamental aspects of intellectual property, which plays an important role in the daily routine of engineers and scientists. The lecture aims to make participants aware of the various methods of protection and to put them in a position to use this knowledge in the workplace. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | In recent years, knowledge about intellectual property has become increasingly important for engineers and scientists. Both in production and distribution and in research and development, they are increasingly being confronted with questions concerning the patenting of technical inventions and the use of patent information. The lecture will acquaint participants with practical aspects of intellectual property and enable them to use the acquired knowledge in their future professional life. Topics covered during the lecture will include: - The importance of innovation in industrialised countries - An overview of the different forms of intellectual property - The protection of technical inventions and how to safeguard their commercialisation - Patents as a source of technical and business information - Practical aspects of intellectual property in day-to-day research, at the workplace and for the formation of start-ups. Case studies will illustrate and deepen the topics addressed during the lecture. The seminar will include practical exercises on how to use and search patent information. Basic knowledge of how to read and evaluate patent documents as well as how to use publicly available patent databases to obtain the required patent information will also be provided. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | The lecture addresses students in the fields of engineering, science and other related technical fields. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
851-0738-00L | Intellectual Property: Introduction Particularly suitable for students of D-CHAB, D-INFK, D-ITET, D-MAVT, D- MATL, D-MTEC. | W | 2 credits | 2V | M. Schweizer | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | The course provides an introduction to Swiss and European intellectual property law (trademarks, copyright, patent and design rights). The legal principles are developed based on current cases. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | The aim of this course is to enable students at ETH Zurich to recognize which rights may protect their creations, and which rights may be infringed as a result of their activities. Students should learn to assess the risks and opportunities of intellectual property rights in the development and marketing of new products. To put them in this position, they need to know the prerequisites and scope of protection afforded by the various intellectual property rights as well as the practical difficulties involved in the enforcement of intellectual property rights. This knowledge is imparted based on current rulings and cases. Another goal is to enable the students to participate in the current debate over the goals and desirability of protecting intellectual creations, particularly in the areas of copyright (keywords: fair use, Creative Commons, Copyleft) and patent law (software patents, patent trolls, patent thickets). | |||||||||||||||||||||||||||||||||||||||||||||||||||||
851-0735-10L | Startups and Law Particularly suitable for students of D-ITET, D-MAVT. | W | 2 credits | 2V | P. Peyrot | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | The students shall obtain a basic knowledge about the legal environment of entrepreneurs. They shall be able to recognize and evaluate legal issues connected to an entrepreneurial activity and suggest possible solutions. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | The students shall obtain the following competence: - They shall obtain a working knowledge on the legal aspects involved in setting up and managing an enterprize. - They shall be acquainted with corporate functions as contracting, negotiation, claims management and dispute resolution - They shall be familiar with the issues of corporate compliance, i.e. the system to ascertain that all legal and ethical rules are observed. - They shall be able to contribute to the legal management of the company and to discuss legal issues. - They shall have an understanding of the law as a part of the corporate strategy and as a valuable ressource of the company. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Lecture notes | A comprehensive script will be made available online on the moodle platform. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
851-0703-00L | Introduction to Law | W | 2 credits | 2V | O. Streiff Gnöpff | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | This class introduces students into basic features of the legal system. Fundamental issues of constitutional law, administrative law, private law and the law of the EU are covered. The focus is on legal problems related to space. Active participation is expected in short interactive sequences. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | Students are able to identify basic structures of the legal system. They unterstand selected topics of public and private law. They are able to apply the fundamentals in more advanced law classes and to recognize the relevance of law in their own field. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | Basic concepts of law, sources of law. Private law: Contract law (particularly contract for work and services), tort law, property law. Public law: Human rights, administrative law, procurement law, procedural law. Insights into the law of the EU and into criminal law. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Lecture notes | Jaap Hage, Bram Akkermans (Eds.), Introduction to Law, Cham 2017 (Online Resource ETH Library) | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Further documents will be available online (https://moodle-app2.let.ethz.ch/course/view.php?id=20127) | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
853-0047-01L | World Politics Since 1945: The History of International Relations (Without Exercises) | W | 3 credits | 2V | A. Wenger | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | This lecture series provides students with an overview of the development of international relations since the end of World War II. The first part of the series deals with the development of and changes in Cold War security policy structures. The second part deals with the period after the transformation of 1989/91; the focus here is on current issues in international security policy. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | By the end of the semester, participants should have a solid knowledge of the history and theoretical foundations of International Relations since the end of the Second World War. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | cf. "Diploma Supplement" | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | The lecure is being supported by a website on Moodle. If you have any questions, please contact Quentin Merle (quentin.merle@sipo.gess.ethz.ch). | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
853-0725-00L | History Part One: Europe (The Cradle of Modernity, Britain, 1789-1914) | W | 3 credits | 2V | H. Fischer-Tiné | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | A range of fundamental processes have transformed European societies in the course of the 19th and the 20th centuries. This lecture series looks a several key aspects of these modernization processes and ask about their continuing relevance for our times . The regional focus lies on the Britain, where these processes took place for the first time. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | At the end of this lecture course, students can: (a) highlight the most important changes in the "long nineteenth century" in Britain (b) explain their long-term effects (also for other European countries ; and (c) relate these changes to global developments today. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | The thematic foci include: Industrialization, urban growth, democratisation and mass politics, shifting gender roles and ideals, and the emergence of consumerism and leisure culture. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Lecture notes | Power Point Slides and references will be made available in digital form during the course of the semester. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Mandatory and further reading will be listed on the course plan that is made available as from the first session. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | This lecture series does not build upon specific previous knowledge by the students. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
701-0703-00L | Environmental Ethics (University of Zurich) No enrolment to this course at ETH Zurich. Book the corresponding module directly at UZH as an incoming student. UZH Module Code: 07SMEEE266 Please register at: https://www.uzh.ch/cmsssl/de/studies/application/chmobilityin.html after you received your logon information you can enrol to courses at: https://studentservices.uzh.ch/uzh/application#/Logon Mind the enrolment deadlines at UZH: https://www.uzh.ch/cmsssl/en/studies/application/deadlines.html | W | 3 credits | 2V | University lecturers | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | The pressing environmental challenges of today demand a critical reflection. Ethics is an important tool for doing so. This lecture introduces the basics of ethics and provides in-depth knowledge of environmental ethics and its debates. This theoretical background will be applied and critically reflected using examples of current environmental challenges. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | On completion of this lecture, you have acquired the ability to identify, analyze, critically reflect and resolve ethical challenges in general and specifically regarding the environment. You know basic concepts, positions and lines of argumentation from the debate in environmental ethics, which you have applied and discussed in smaller exercises. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
853-0061-00L | Introduction to Cybersecurity Politics | W | 3 credits | 2G | M. Dunn Cavelty, F. J. Egloff | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | The lecture is an introduction to global cybersecurity politics. The focus is on the strategic use of cyberspace by state and non-state actors (threats) and different answers to these new challenges (countermeasures). | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | Participants learn to assess the advantages and disadvantages of cyberspace as a domain for strategic military operations. They understand the technical basics of cyber operations and know how technology and politics are interlinked in this area. They understand the security challenges for and the motivations of states to be active in cyberspace offensively and defensively and they are familiar with the consequences for international politics. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | We start with an overview of cybersecurity issue from 1980 to today and look at events and actors responsible for turning cybersecurity matters into a security political issue with top priority. After familiarizing ourselves with the technical basics, we look at different forms of cyberviolence and trends in cyber conflicts (technique in social and political practice). Then, we turn to countermeasures: we compare national cybersecurity strategies, examine international norms building, and scrutinize concepts such as cyber-power and cyber-deterrence (technique in social and political regulartory contexts). | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Lecture notes | A script with background information and comments on the literature will be made available at the beginning of the semester. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Literature for each session will be available on Moodle. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | The lecture is being supported by a website on Moodle. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
853-8002-00L | The Role of Technology in National and International Security Policy | W | 3 credits | 2G | O. Thränert, A. Dossi, M. Leese, N. Masuhr | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | The lecture provides an introduction to the role of security and military technologies in the formulation and implementation of national and international security policies. The focus is on challenges posed by new and developing technologies, the transformation of military capabilities, and the question of regulation. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | Participants will gain an in-depth overview of the many ways in which technology is becoming part of security policies and practices, in both civilian and military contexts. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | Der erste Teil befasst sich mit den vielgestaltigen und komplexen Beziehungen zwischen Konzepten nationaler und internationaler Sicherheit, der Förderung von Forschung und Entwicklung, ökonomischen Aspekten von Technologie, und Aussenpolitik und Diplomatie. Der zweite Teil behandelt die Auswirkungen von neuen Technologien auf militärische Kapazitäten, strategische Optionen, und Militärdoktrinen in Krieg und Frieden. Der dritte Teil konzentriert sich auf regulatorische Herausforderungen, die aus der Implementierung und der globalen Weiterverbreitung von Technologie resultieren. Der letzte Teil schliesslich beschäftigt sich mit den Herausforderungen für den Staat im Umgang mit neuen und noch in der Entwicklung befindlicher Technologien, vorrangig in den sensiblen Bereich der Rüstungsbeschaffung und des nachrichtendienstlichen Einsatzes. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Literatur für die einzelnen Sitzungen wird auf Moodle bereitgestellt. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | The lecture is being supported by a website on Moodle. If you have any questions, please contact Quentin Merle, quentin.merle@sipo.gess.ethz.ch. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
851-0742-01L | Contract Design II Does not take place this semester. To be considered for Contract Design II, you must have completed Contract Design I in the same semester. Students can only register for Contract Design II after having obtained approval by Prof. Stremitzer. | W | 1 credit | 1U | A. Stremitzer | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | Contract Design II is a masterclass in the form of an interactive clinic that allows you to deepen your understanding of contracting by applying insights from Contract Design I to a comprehensive case study. Together with your classmates, you are going to advise a (hypothetical) client organization planning to enter a complex transaction on how to structure the underlying contract. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | There is a possibility that representatives from companies that were previously engaged in similar deals will visit us in class and tell you about their experience firsthand. In Contract Design I, you will receive more detailed information on the content and learning objectives of Contract Design II. If you have urgent questions, please do not hesitate to send an e-mail to Professor Stremitzer’s Teaching Assistant Diego Caldera (diegoalberto.calderaherrera@uzh.ch). | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | To enable you to work under the close supervision of your professor and his team, only a small group of students with backgrounds in law, business, or engineering is admitted to this course. This simulation is time-consuming and challenging. Hence, we can only admit the most successful and motivated students to this class. Further information on the application process will follow. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
851-0391-00L | Focus on the Human: Human-Centered Security and Privacy Lab The course is particularly suitable for all students who have already completed the course “Human-centered IT Security and Privacy” as some of the concepts introduced will practically be applied in this course. However, the relevant literature and necessary material will be provided to all students and basic concepts will be briefly summarized so that all interested students can participate. | W | 3 credits | 2S | V. Zimmermann, L. Schöni | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | After an introduction on usable security as the intersection of computer science and psychology, students will form teams and work on exemplary security- or privacy-related research questions. The teams will develop and evaluate a concept for a human-centered solution. Through input sessions and milestone presentations the human perspective will be incorporated and reflected upon. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | The course makes students experience an exemplary human-centered design process. They will learn about and practically apply human-centered design and evaluation methods that will allow them to view their solution from the human perspective, e.g., the user, developer or website owner perspective. By taking part in the evaluation of other teams, they will also take the user perspective themselves. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | At the beginning of the course, the students will receive an introduction to usable IT security and privacy and relevant concepts. Afterwards, a selection of current research questions from that area will be presented. The students form teams and select one of the proposed research questions. This question will accompany the students throughout the semester. They will design and evaluate a concept for a human-centered solution to that question. To be able to do so, they will receive input on human-centered design and evaluation tools. Their progress and the inclusion of the human perspective will be subject to feedback in milestone presentations. The students’ human-centered solution can take the form of a concept (e.g., a concept for a product or app), interface (e.g., a visual or tangible interface), or prototype (e.g., sketches, a click-dummy or a built prototype). The solution will then be subject to evaluations. The solutions will be user-tested by members of other teams that thereby take the perspective of a user themselves. In addition, the solutions will be analyzed from different stakeholders’ perspectives, such as developers or website owners. Finally, the students will reflect on potential changes that results from the evaluations and their consequences. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Literature Recommendations: Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. Cranor, L. F., & Garfinkel, S. (2005). Security and usability: designing secure systems that people can use. " O'Reilly Media, Inc.". Diefenbach, S., & Hassenzahl, M. (2017). Psychologie in der nutzerzentrierten Produktgestaltung: Mensch-Technik-Interaktion-Erlebnis. Springer-Verlag. Diefenbach, S., & Hassenzahl, M. (2010). Handbuch zur Fun-ni Toolbox–User Experience Evaluation auf drei Ebenen. Dix, A., & Finlay, J., Abowd, G., Beale, R. (2004). Human-computer interaction. Pearson - PRENTICE HALL. Garfinkel, S., & Lipford, H. R. (2014). Usable security: History, themes, and challenges. Synthesis Lectures on Information Security, Privacy, and Trust, 5(2), 1-124. Nielsen, J. (1999). Designing web usability: The practice of simplicity. New Riders Publishing. Norman, D. (2013). The design of everyday things: Revised and expanded edition. Basic Books (AZ). Reuter, C. (2018). Sicherheitskritische Mensch-Computer-Interaktion. Wiesbaden: Springer Fachmedien Wiesbaden. Sarodnick, F., & Brau, H. (2006). Methoden der Usability Evaluation. Verlag Hans Huber. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | This course is especially recommended after having participated in the related lecture/exercise "851-0390-00 G Human-Centered IT Security and Privacy". However, previous participantion in the lecture is not a requirement. Additional material will be made available so that also students with no prior knowledge in that area can participate. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
851-0196-00L | Philosophy of Pure and Applied Mathematics: From Foundations to Practice | W | 3 credits | 2S | Y. P.‑H. Hamami | |||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | This course is a general introduction to the philosophy of mathematics for science, mathematics and engineering students. It will introduce the main views and debates on the nature of mathematics present in contemporary philosophy. A special focus will be put on questions pertaining to the foundations of mathematics as well as on philosophical issues emerging from actual mathematical practice. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | The objective of this course is to help students develop a reflective stance on what mathematics is and on its special place in the landscape of human knowledge. We expect students to be able to report the main philosophical conceptions of what mathematics is. We also expect them to be familiar with key debates in the philosophy of mathematics. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | This course is a general introduction to the philosophy of mathematics for science, mathematics and engineering students. It will introduce the main views and debates on the nature of mathematics present in contemporary philosophy. A special focus will be put on questions pertaining to the foundations of mathematics as well as on philosophical issues emerging from the actual practice of mathematics. The course is composed of four parts. Part I: Foundations of Mathematics. In this first part of the course, we will present the debates concerning the foundations of mathematics at the turn of the twentieth century. We will review the three main philosophical conceptions of mathematics developed during this period: logicism, formalism and intuitionism. Part II: Ontology and Epistemology of Mathematical Objects What is the nature of mathematical objects? And how can we acquire knowledge about them? Here we will present several ways of approaching these questions. We will discuss philosophical views that conceive mathematical objects as similar to physical objects, as creations of the human mind, as fictional characters, and as places in larger structures. We will see the strengths and weaknesses of these different views. Part III: Philosophy of Mathematical Practice In this part of the course, we will be concerned with a recent movement in the philosophy of mathematics dealing with the actual practice of mathematics. We will see two trends of research developed within this tradition. The first one aims to explain how we can think and reason mathematically with non-linguistic representations such as diagrams and symbolic notations. The second one asks whether there could be such things as explanations in mathematics and if yes what they are. The paradigmatic examples we will discuss here are mathematical proofs that not only establish that a theorem is true but also explain why it is true. Part IV: The Applicability of Mathematics to the Natural World It is a truism that mathematics is used everywhere in the natural and social sciences. But how come that mathematics applies so well to the natural world? If mathematics is just a pure game with symbols, or a pure invention of the human mind, it seems difficult to explain why it is so useful when formulating scientific theories about the world. In this part of the course, we will discuss this problem known as the applicability of mathematics, and we will see different philosophical solutions that have been developed to address it. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
851-0763-00L | Supervised Research (Law, Economics, and Data Science) | W | 3 credits | E. Ash, S. Galletta | ||||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | This is a supervised student project for 3 ECTS, supervised by the professorship of Elliott Ash (D-GESS). Students will adapt tools from econometrics and machine learning to questions in law, data science, and social science. Students must have some data science and/or statistics experience. Some programming experience in Python, Stata, or R is required. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | Apply tools from data science and social science to a new project, potentially in a group, to develop a paper or app. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | Some programming experience in Python, Stata, or R is required. Some experience with data science or statistics is required. |
- Page 1 of 1