Ethics for the Information Age
Enroll in Ethics for the Information Age course and lab to gain expertise on evaluating social and ethical concerns in the Information Age. The Ethics course and lab provide coverage of the topics such as networked communications, intellectual property, information privacy, computer and network security, computer reliability, and more. Our comprehensive Ethics training will help you understand automation and employment, globalization, and other important topics of this industry.
- Price: $279.99
- Delivery method: eLearning
- DIR Discount: 20%
Submit form to obtain discount
Test Prep
50+ Pre Assessment Questions |
50+ Post Assessment Questions |
Features
Why choose TOPTALENT?
- Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.
- Access an expansive range of over 3,000 training courses with a strong focus on Information Technology, Business Applications, and Leadership Development.
- Have confidence in an exceptional 95% approval rating from our students, reflecting outstanding satisfaction with our course content, program support, and overall customer service.
- Benefit from being taught by Professionally Certified Instructors with expertise in their fields and a strong commitment to making sure you learn and succeed.
Outline
Lessons 1:
Catalysts for Change
- Introduction
- Milestones in Computing
- Milestones in Networking
- Milestones in Information Storage and Retrieval
- Contemporary Information Technology Issues
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 2:
Introduction to Ethics
- Introduction
- Subjective Relativism
- Cultural Relativism
- Divine Command Theory
- Ethical Egoism
- Kantianism
- Act Utilitarianism
- Rule Utilitarianism
- Social Contract Theory
- Virtue Ethics
- Comparing Workable Ethical Theories
- Morality of Breaking the Law
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 3:
Networked Communications
- Introduction
- Spam
- Internet Interactions
- Text Messaging
- Political Impact of Social Media and Online Advertising
- Censorship
- Freedom of Expression
- Children and Inappropriate Content
- Breaking Trust
- Internet Addiction
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 4:
Intellectual Property
- Introduction
- Intellectual Property Rights
- Protecting Intellectual Property
- Fair Use
- Digital Media
- Peer-to-Peer Networks and Cyberlockers
- Protections for Software
- Legitimacy of Intellectual Property Protection for Software
- Open-Source Software
- Creative Commons
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 5:
Information Privacy
- Introduction
- Perspectives on Privacy
- Information Disclosures
- Data Mining
- Examples of Consumer or Political Backlash
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 6:
Privacy and the Government
- Introduction
- US Legislation Restricting Information Collection
- Information Collection by the Government
- Covert Government Surveillance
- US Legislation Authorizing Wiretapping
- USA PATRIOT Act
- Regulation of Public and Private Databases
- Data Mining by the Government
- National Identification Card
- Information Dissemination
- Invasion
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 7:
Computer and Network Security
- Introduction
- Hacking
- Malware
- Cyber Crime and Cyber Attacks
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 8:
Computer Reliability
- Introduction
- Data-Entry or Data-Retrieval Errors
- Software and Billing Errors
- Notable Software System Failures
- Therac-25
- Tesla Version 7.0 (Autopilot)
- Uber Test-Vehicle Accident
- Computer Simulations
- Software Engineering
- Software Warranties and Vendor Liability
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 9:
Professional Ethics
- Introduction
- How Well Developed Are the Computing Professions?
- Software Engineering Code of Ethics
- Analysis of the Code
- Case Studies
- Whistle-Blowing
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Lessons 10:
Work and Wealth
- Introduction
- Automation and Employment
- Workplace Changes
- Globalization
- The Digital Divide
- The “Winner-Take-All” Society
- Summary
- Further Reading and Viewing
- Discussion Questions
- In-Class Exercises
- References
Appendix A: Plagiarism
- Consequences of Plagiarism
- Guidelines for Citing Sources
- Additional Information
Appendix B: Introduction to Argumentation
- B.1 Introduction