University of Colorado Boulder - Computing, Ethics, and Society Foundations
- Offered byCoursera
Computing, Ethics, and Society Foundations at Coursera Overview
Duration | 24 hours |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Computing, Ethics, and Society Foundations at Coursera Highlights
- Earn a certificate of completion
- Add to your LinkedIn profile
Computing, Ethics, and Society Foundations at Coursera Course details
- What you'll learn
- Identify and manage ethical situations that may arise in their careers.
- Understand and be able to apply ethical frameworks to help them analyze ethical challenges.
- Identify some of the main ethical issues that arise in the use of the internet, including privacy, security, and the impacts of social media.
- Describe key issues related to misinformation on the internet
- Computing systems and technologies fundamentally impact the lives of most people in the world, including how we communicate, get information, socialize, and receive healthcare. This course is the first of a three-course sequence that examines ethical issues in the design and implementation of computing systems and technologies and reflects upon the broad implication of computing on our society. It covers ethical theories, privacy, security, social media, and misinformation. This course can be taken for academic credit as part of CU Boulder's MS in Computer Science degrees offered on the Coursera platform. These fully accredited graduate degrees offer targeted courses, short 8-week sessions, and pay-as-you-go tuition. Admission is based on performance in three preliminary courses, not academic history. CU degrees on Coursera are ideal for recent graduates or working professionals.
Computing, Ethics, and Society Foundations at Coursera Curriculum
Course Overview and Ethical Foundations
Course Overview: Part 1
Course Overview: Part 2
Kantianism and Virtue Ethics: Part 1
Kantianism and Virtue Ethics: Part 2
Utilitarianism and Social Contract Theory: Part 1
Utilitarianism and Social Contract Theory: Part 2
Earn Academic Credit for your Work!
Course Support
Introduction to Ethics
Applying an Ethical Framework
"The Trolley Problem" - Video
Kantianism/Deontology and Virtue Ethics
Optional Readings on Virtue Ethics and Ethical Theories
Utilitarianism and Social Contract Theory
Should Batman Kill the Joker?
ACM Code of Ethics and Professional Conduct Studies (Malware)
Optional Reading on Utilitarianism
Ethical Theories
Professional Ethics Case Study
The Four Ethical Theories
Internet Related Issues: Part 1
Internet Background
Recommender Systems: Part 1
Recommender Systems: Part 2
Advertising: Part 1
Advertising: Part 2
TED Talk About Advertisements
Case Study: YouTube
Ethical Challenges Posed by Recommender Systems
Ethical Concerns with Social Media Banning
Data That Facebook Uses to Target Ads
Facebook's Ad Algorithm is Discriminatory
Targeted Ads: Annoying, but also Harmful
Antitrust: Google's Abusive Practices in Online Advertising
Internet and Advertising
Recommender Systems and Advertising Article Review
Ethical Framework
Facebook Advertising
Internet Related Issues: Part 2
Social Media Impact on Youth: Part 1
Social Media Impact on Youth: Part 2
Misinformation: Politically-related Instances: Part 1
Misinformation: Politically-related Instances: Part 2
Misinformation: Varied Instances, and Prognosis: Part 1
Misinformation: Varied Instances, and Prognosis: Part 2
Social Media's Negative Impact on Teen Health
Google Maps and Disputed Territory - Video
Russia's "Information Operations" on Social Media
Botslayer - Tracking Coordinated Disinformation Campaigns Online
Facebook in India - Hate Speech and Misinformation
Optional - Anatomy of an Online Misinformation Network
Combating the "Deepfake" Future
COVID-19 Misinformation
Major Themes on the Future of the Online Information Environment
Social Media: Mental Health and Misinformation
Social Media and Misinformation Article Review
2 Article Discussions
Privacy and Security
Computer Privacy: A Sampling of Issues: Part 1
Computer Privacy: A Sampling of Issues: Part 2
Computer Privacy: Legal and Regulatory Approaches: Part 1
Computer Privacy: Legal and Regulatory Approaches: Part 2
Computer Privacy: A Sampling of Breaches: Part 1
Computer Privacy: A Sampling of Breaches: Part 2
Computer Privacy: Ransomware, and Ethical Hacking (Part 1)
Computer Privacy: Ransomware, and Ethical Hacking (Part 2)
Controversies Surrounding "Superhuman" - Silicon Valley's Hottest Email App
Privacy Debate Surrounding NYC's Vaccine Passport Plan
Apple Faces Privacy Concerns and Delays Rollout of Child-Safety Features
Algorithm That Combats Digital Anonymity
New Data Privacy Laws in 2023
The Right to be Forgotten
The Rewriting of India's Technology Laws
China's Strict Data-Privacy Laws
Google's Technology is Violating Texans' Privacy Rights
Massive Security Breaches
Ransomware
The Definition of Ethical Hacking
Why I Teach People How to Hack - TEDx Talk
Obtaining Digital Information
Computer Privacy and Security Article Review
The Right to Be Forgotten
Security Breaches