Ethics For The Information Age 

Take a thoughtful approach to understanding the social and ethical considerations involved in the promotion of information technology advancement.

(ETHICS-IN-AGE.AB1) / ISBN : 978-1-64459-244-1
This course includes
Interactive Lessons
Gamified TestPrep
Lab
AI Tutor (Add-on)
125 Reviews
Get A Free Trial

About This Course

Our Ethics for the Information Age training course discusses core concepts, such as privacy, intellectual property, security, and the impact of technology on society. You’ll explore ethical theories and their application to real-world scenarios involving social media, big data, and artificial intelligence. By examining case studies and current events, you’ll develop critical thinking skills to navigate ethical dilemmas in your professional and personal lives.

Skills You’ll Get

  • Learn to evaluate and make informed ethical choices in complex scenarios involving technology.
  • Develop the ability to analyze and critique ethical issues in the digital age.
  • Recognize and assess the broader societal implications of technological advancements.
  • Apply various ethical frameworks to real-world situations involving information technology.

1

Catalysts for Change

  • Introduction
  • Milestones in Computing
  • Milestones in Networking
  • Milestones in Information Storage and Retrieval
  • Contemporary Information Technology Issues
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
2

Introduction to Ethics

  • Introduction
  • Subjective Relativism
  • Cultural Relativism
  • Divine Command Theory
  • Ethical Egoism
  • Kantianism
  • Act Utilitarianism
  • Rule Utilitarianism
  • Social Contract Theory
  • Virtue Ethics
  • Comparing Workable Ethical Theories
  • Morality of Breaking the Law
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
3

Networked Communications

  • Introduction
  • Spam
  • Internet Interactions
  • Text Messaging
  • Political Impact of Social Media and Online Advertising
  • Censorship
  • Freedom of Expression
  • Children and Inappropriate Content
  • Breaking Trust
  • Internet Addiction
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
4

Intellectual Property

  • Introduction
  • Intellectual Property Rights
  • Protecting Intellectual Property
  • Fair Use
  • Digital Media
  • Peer-to-Peer Networks and Cyberlockers
  • Protections for Software
  • Legitimacy of Intellectual Property Protection for Software
  • Open-Source Software
  • Creative Commons
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
5

Information Privacy

  • Introduction
  • Perspectives on Privacy
  • Information Disclosures
  • Data Mining
  • Examples of Consumer or Political Backlash
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
6

Privacy and the Government

  • Introduction
  • US Legislation Restricting Information Collection
  • Information Collection by the Government
  • Covert Government Surveillance
  • US Legislation Authorizing Wiretapping
  • USA PATRIOT Act
  • Regulation of Public and Private Databases
  • Data Mining by the Government
  • National Identification Card
  • Information Dissemination
  • Invasion
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
7

Computer and Network Security

  • Introduction
  • Hacking
  • Malware
  • Cyber Crime and Cyber Attacks
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
8

Computer Reliability

  • Introduction
  • Data-Entry or Data-Retrieval Errors
  • Software and Billing Errors
  • Notable Software System Failures
  • Therac-25
  • Tesla Version 7.0 (Autopilot)
  • Uber Test-Vehicle Accident
  • Computer Simulations
  • Software Engineering
  • Software Warranties and Vendor Liability
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
9

Professional Ethics

  • Introduction
  • How Well Developed Are the Computing Professions?
  • Software Engineering Code of Ethics
  • Analysis of the Code
  • Case Studies
  • Whistle-Blowing
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
10

Work and Wealth

  • Introduction
  • Automation and Employment
  • Workplace Changes
  • Globalization
  • The Digital Divide
  • The “Winner-Take-All” Society
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
A

Appendix A: Plagiarism

  • Consequences of Plagiarism
  • Guidelines for Citing Sources
  • Additional Information
B

Appendix B: Introduction to Argumentation

  • B.1 Introduction

Catalysts for Change

  • Understanding Mechanical Calculator
  • Understanding Information Storage and Retrieval Technologies
  • Understanding Catalysts for Change

Introduction to Ethics

  • Understanding Ethical Relativism Theories
  • Understanding Utility Theories
  • Understanding Ethics

Networked Communications

  • Understanding Networked Communications

Intellectual Property

  • Identifying Intellectual Property Examples
  • Protecting Intellectual Property
  • Understanding Open-Source Software
  • Understanding Intellectual Property

Information Privacy

  • Understanding Privacy
  • Learning Information Privacy

Privacy and the Government

  • Understanding the Patriot Act
  • Understanding the Privacy Act
  • Understanding Privacy and the Government

Computer and Network Security

  • Understanding Computer and Network Security

Computer Reliability

  • Understanding Computer Reliability

Professional Ethics

  • Understanding Responsibilities

Work and Wealth

  • Understanding Work and Wealth

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

There are no formal prerequisites for enrolling in this course. However, having basic knowledge about information technology, security, and current affairs will benefit you.

Our Ethics for Information Age training consists of interactive video lessons and gamified test preps involving multiple choice questions, fill-in-the-blanks, glossary, flashcards, and more!

You can contact our support team for assistance via email, phone call, or live chat. They’re available 24/7. For ongoing support, you can opt for instructor-led or mentor-led learning mode.

Related Courses

All Course
scroll to top