Ethics for the Information Age

(ATHNS-ETHICS.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Catalysts for Change

  • Introduction
  • Milestones in Computing
  • Milestones in Networking
  • Milestones in Information Storage and Retrieval
  • Contemporary Information Technology Issues
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
2

Introduction to Ethics I

  • Introduction
  • Subjective Relativism
  • Cultural Relativism
  • Divine Command Theory
  • Ethical Egoism
  • Kantianism
  • Act Utilitarianism
  • Rule Utilitarianism
  • Social Contract Theory
3

Introduction to Ethics - Part II

  • Virtue Ethics
  • Comparing Workable Ethical Theories
  • Morality of Breaking the Law
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
4

Networked Communications - Part I

  • Introduction
  • Spam
  • Internet Interactions
  • Text Messaging
  • Political Impact of Social Media and Online Advertising
  • Censorship
  • Freedom of Expression
5

Networked Communications - Part II

  • Children and Inappropriate Content
  • Breaking Trust
  • Internet Addiction
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
6

Intellectual Property

  • Introduction
  • Intellectual Property Rights
  • Protecting Intellectual Property
  • Fair Use
  • Digital Media
  • Peer-to-Peer Networks and Cyberlockers
  • Protections for Software
  • Legitimacy of Intellectual Property Protection for Software
  • Open-Source Software
  • Creative Commons
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
7

Information Privacy

  • Introduction
  • Perspectives on Privacy
  • Information Disclosures
  • Data Mining
  • Examples of Consumer or Political Backlash
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
8

Privacy and the Government

  • Introduction
  • US Legislation Restricting Information Collection
  • Information Collection by the Government
  • Covert Government Surveillance
  • US Legislation Authorizing Wiretapping
  • USA PATRIOT Act
  • Regulation of Public and Private Databases
  • Data Mining by the Government
  • National Identification Card
  • Information Dissemination
  • Invasion
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
9

Computer and Network Security

  • Introduction
  • Hacking
  • Malware
  • Cyber Crime and Cyber Attacks
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
10

Computer Reliability

  • Introduction
  • Data-Entry or Data-Retrieval Errors
  • Software and Billing Errors
  • Notable Software System Failures
  • Therac-25
  • Tesla Version 7.0 (Autopilot)
  • Uber Test-Vehicle Accident
  • Computer Simulations
  • Software Engineering
  • Software Warranties and Vendor Liability
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
11

Professional Ethics

  • Introduction
  • How Well Developed Are the Computing Professions?
  • Software Engineering Code of Ethics
  • Analysis of the Code
  • Case Studies
  • Whistle-Blowing
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
12

Work and Wealth

  • Introduction
  • Automation and Employment
  • Workplace Changes
  • Globalization
  • The Digital Divide
  • The “Winner-Take-All” Society
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
A

Appendix C: PROJECT

B

Appendix A: Plagiarism

  • Consequences of Plagiarism
  • Guidelines for Citing Sources
  • Additional Information
C

Appendix B: Introduction to Argumentation

  • B.1 Introduction

1

Catalysts for Change

  • Understanding Mechanical Calculator
  • Understanding Information Storage and Retrieval Technologies
  • Understanding Catalysts for Change
2

Introduction to Ethics I

  • Understanding Ethical Relativism Theories
  • Understanding Utility Theories
  • Understanding Ethics
3

Networked Communications - Part II

  • Understanding Networked Communications
4

Intellectual Property

  • Identifying Intellectual Property Examples
  • Protecting Intellectual Property
  • Understanding Open-Source Software
  • Understanding Intellectual Property
5

Information Privacy

  • Understanding Privacy
  • Learning Information Privacy
6

Privacy and the Government

  • Understanding the Patriot Act
  • Understanding the Privacy Act
  • Understanding Privacy and the Government
7

Computer and Network Security

  • Understanding Computer and Network Security
8

Computer Reliability

  • Understanding Computer Reliability
9

Professional Ethics

  • Understanding Responsibilities
10

Work and Wealth

  • Understanding Work and Wealth

Related Courses

All Courses
scroll to top