Enroll in Ethics for the Information Age course and lab to gain expertise on evaluating social and ethical concerns in the Information Age. The Ethics course and lab provide coverage of the topics such as networked communications, intellectual property, information privacy, computer and network security, computer reliability, and more. Our comprehensive Ethics training will help you understand automation and employment, globalization, and other important topics of this industry.

starstarstarstarstar

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Gain the foundational knowledge you need to take the first stesp on this topic.

1
  • Catalysts for Change

  • Introduction
    Milestones in Computing
    Milestones in Networking
    Milestones in Information Storage and Retrieval
    Contemporary Information Technology Issues
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

2
  • Introduction to Ethics

  • Introduction
    Subjective Relativism
    Cultural Relativism
    Divine Command Theory
    Ethical Egoism
    Kantianism
    Act Utilitarianism
    Rule Utilitarianism
    Social Contract Theory
    Virtue Ethics
    Comparing Workable Ethical Theories
    Morality of Breaking the Law
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

3
  • Networked Communications

  • Introduction
    Spam
    Internet Interactions
    Text Messaging
    Political Impact of Social Media and Online Advertising
    Censorship
    Freedom of Expression
    Children and Inappropriate Content
    Breaking Trust
    Internet Addiction
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

4
  • Intellectual Property

  • Introduction
    Intellectual Property Rights
    Protecting Intellectual Property
    Fair Use
    Digital Media
    Peer-to-Peer Networks and Cyberlockers
    Protections for Software
    Legitimacy of Intellectual Property Protection for Software
    Open-Source Software
    Creative Commons
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

5
  • Information Privacy

  • Introduction
    Perspectives on Privacy
    Information Disclosures
    Data Mining
    Examples of Consumer or Political Backlash
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

6
  • Privacy and the Government

  • Introduction
    US Legislation Restricting Information Collection
    Information Collection by the Government
    Covert Government Surveillance
    US Legislation Authorizing Wiretapping
    USA PATRIOT Act
    Regulation of Public and Private Databases
    Data Mining by the Government
    National Identification Card
    Information Dissemination
    Invasion
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

7
  • Computer and Network Security

  • Introduction
    Hacking
    Malware
    Cyber Crime and Cyber Attacks
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

8
  • Computer Reliability

  • Introduction
    Data-Entry or Data-Retrieval Errors
    Software and Billing Errors
    Notable Software System Failures
    Therac-25
    Tesla Version 7.0 (Autopilot)
    Uber Test-Vehicle Accident
    Computer Simulations
    Software Engineering
    Software Warranties and Vendor Liability
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

9
  • Professional Ethics

  • Introduction
    How Well Developed Are the Computing Professions?
    Software Engineering Code of Ethics
    Analysis of the Code
    Case Studies
    Whistle-Blowing
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

10
  • Work and Wealth

  • Introduction
    Automation and Employment
    Workplace Changes
    Globalization
    The Digital Divide
    The “Winner-Take-All” Society
    Summary
    Further Reading and Viewing
    Discussion Questions
    In-Class Exercises
    References

11
  • Appendix A: Plagiarism

  • Consequences of Plagiarism
    Guidelines for Citing Sources
    Additional Information

12
  • Appendix B: Introduction to Argumentation

  • B.1 Introduction

Audience

Anyone wishing to explore this topic will benefit.

Language

English

Prerequisites

There are no rerequisites for this course.

Length: 365.0 days ( hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...