75 euros More information
Free quota for University of Helsinki students - enroll through this page (enrol button), not in WebOodi.
WHEN - Enrollment begins 45 days before the beginning of the course. You can see the exact enrollment dates through clicking on the enrol button on the top of this page.
HOW - Use the enrol button on the top of this page to enroll if you meet one of the following criteria:
- You have a Finnish personal identity number, or
- you are a student at the University of Helsinki, or
- you are a student at a HAKA member institution.
Open University reserves the right to make changes to the study programme.
The course is recommended to anyone interested in the social, ethical, legal and cultural issues in computing and information and communications technology. No specific prior knowledge on the topic is assumed and no prerequisites are required.
Part of Bachelor's programme in Science, subject studies in Computer and Data Science study track. The course is available to students from other degree programmes.
After successful completion of the course, you will be able to:
- describe some major social promises and risks associated with the developments in information and communications technology, identify some technical solutions and evaluate some hardware and software designs in their social context
- analyze and formulate ethical arguments and identify some common logical fallacies and express some of the main differences between the major theories in normative ethics
- explain what professionalism, the ethical responsibility of a professional and professional ethics are about. Knows some major information technology organizations. Can analyze the roles of professionals and public policy in a global computing issue, distinguish between some different views on computer ethics and summarize the main points in the history of the research field
- identify ethical issues in software development, apply codes of ethics, conduct and practice in decision-making, evaluate the codes and describe some of their strengths and weaknesses, explain the importance of public good in decision-making and identify the progressive stages in a whistle-blowing incident
- discuss the philosophical foundations of privacy rights and refer to some relevant legislation, give a wide overview of the challenges to privacy in the networked world, including the collection and merging of user data, various kinds of surveillance and cloud computing. Can explain some technological solutions for privacy protection and the importance of proper anonymization. Understands and is able to express the main idea of differential privacy at a general level, describe some background for and some social implications of the so-called hacktivism
- discuss the philosophical bases of intellectual property, refer to some relevant legislation and discuss some associated problems. The topics include copyright, software patents, licensing and plagiarism. Understands and is able to explain the ideas behind open-source software development and free software. Can distinguish between some relevant and widely-used open source licenses and is able to describe some of the main differences between them
- identify the aspects of sustainable development, explain how ICT and the choices made by the developers and the users can both promote and threaten sustainable development
- understands the importance of effective professional communication, including clear documentation, can identify some associated problems, distinguish between different types of collaboration tools and evaluate some of their strengths and weaknesses
You should also be familiar with the other topics listed under the title "Course content". The topics covered in the course are found in the knowledge area "Social Issues and Professional Practice" as presented in the Computer Science Curricula by ACM and IEEE.
The development of information and communications technology. Some social context and implications.
- ubiquitous computing, Internet, the Internet of Things, context awareness, artificial intelligence, digitalization, big data, technological convergence, emerging technologies.
- information society, virtual communities, social media, culture, electronic voting, disinformation, freedom of speech, censorship, data leaks, digital divide, gender issues, accessibility, designing for accessibility and usability.
A look at privacy and security
- digital footprint, surveillance, some relevant legislation.
- data security and cybercrime, including data breaches and identity theft.
- cyberterrorism, information warfare, the vulnerability of the society.
A deeper look at two example cases linked to a number of the topics listed above
Ethics and ethical argumentation
- ethics, morals, values, norms. Cultural relativism. Virtue ethics, deontology, consequentalism.
- ethical argumentation (validity, soundness, reductio ad absurdum). Inductive reasoning (strength, causality, the use of analogy). Evaluating stakeholder positions.
- some common logical fallacies.
- some attempts at constructing ethical algorithms and heuristics.
- different views on the meaning, nature and scope of computer ethics. A brief history of the research field.
- the nature of professionalism, professional ethics and codes of ethics.
- some professional organizations. Most importantly ACM, IFIP, IEEE CS and TIVIA. The role in public policy.
- some codes of ethics, conduct and practice. Most importantly the ACM Code of Ethics and Professional Conduct, the ACM/IEEE Software Engineering Code of Ethics and the ethical guidelines by TIVIA.
Computer ethics, continued
- applying the codes of ethics, conduct and practice. Examples illustrating various aspects.
- public good, whistle-blowing.
- accountability, responsibility and liability. Professional standards and cost considerations.
- harassment, discrimination. Use policies. Healthy computing environments.
- keeping up-to-date. Professional credentialing.
Privacy and security revisited
- the ethical and philosophical point of view. Also hacker ethics, hacktivism and some associated problems.
- some organizations linked to privacy and security.
- a look at privacy and security at the organizational level. Anonymization, differential privacy.
- some other technological solutions for privacy protection. A look at the data security of the individual user.
- the ethical point of view, some philosophical foundations and relevant legislation.
- intangible digital intellectual property. Copyright, software patents, licensing, trade secrets, trade marks.
- copyright infringements, software piracy, plagiarism. DRM, watermarking.
- some relevant organizations.
- open data, open source, free software. Some licenses, including GPL, BSD and CC. Open source appropriate technology.
- definition and goals (the UN 2030 agenda).
- how ICT may potentially foster sustainability. Green computing.
- the environmental and social impacts of ICT. Energy consumption, sources and harvesting. E-waste, recycling and some associated problems. On the life cycle of ICT machinery.
- the ethical point of view.
- documentation, standardization, source code.
- different forms and dynamics of computer-supported co-operative work.
- global software development.
Required: the online course material and the referred online sources.
Recommended: Tavani, H. T. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Third edition or later, John Wiley & Sons, Inc.
Assessment will mostly be based on the course exam and exercises, with roughly equal weights. In addition, there will be a small online exam, which will be automatically graded and which may be taken only once. While the essays are peer-reviewed, they are nevertheless graded by the tutor or the lecturer.
Successful completion requires 50% of maximal points, including at least 50% from the course exam.
Grading 1 - 5.
- WHERE - The course is studied in the online learning environment Moodle
- WHEN - The Moodle space opens on 19 January 2021.
- HOW TO ACCESS - You will receive the Moodle-link and the course key through email after course enrollment.
- Do you study at University of Helsinki or other HAKA member institution?
- If yes, use your username and password to log in to Moodle.
- If no, please activate your University of Helsinki user ID to access Moodle. You will receive more information on the user ID after enrollment through email.
- Do you study at University of Helsinki or other HAKA member institution?
- The lectures are on Tuesdays at 5 -7 p.m. from 19 January to 13 April 2021.
- There will be ten (10) lectures.
- Lecture recordings will be accessible after the lecture hours.
- No participation is required if you watch the recordings afterwards.
- You will write short essays based on the course material and external online sources.
- The essays should also include some self-reflection and they will be peer-reviewed by the other participants.
- There will be online forums for discussion, peer review and guidance given by the lecturer or the tutor.
- Both the course exam and the small quiz will be online.
- Course exam options:
- Monday 10.5.2021 5-8 p.m.
- Wednesday 26.5.2021 5-8 p.m.
- Monday 7.6.2021 5-8 p.m
- No registration for the exams.
- If you need some special arragements or support for the examination, contact your education specialist at least 10 days beforehand. Read more: Instructions for online examinations / Arragements for students in need of special support