eth328 | undergraduate

Data Ethics And Security

Explore by:

or call us at

About:

About:

This course provides students with an overview of the legal and ethical implications of data. Students will examine the legal and ethical issues that must be considered throughout the lifecycle of data analytics including collection, storage, analysis, and presentation. Other topics include privacy, security, classification, and discrimination. After completion of this course, students will be able to understand the legal and ethical considerations that are necessary when utilizing particular types of data, collection methods, and analysis techniques.

This undergraduate-level course is 5 weeks To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5 weeks

topic title goes here

    Intellectual Property Disputes and the Regulation of Commerce and Speech in the Digital Divide

    • Describe regulatory requirements related to Internet commerce.
    • Explain how cybertechnology has changed the notion of work and the quality of life.
    • Compare intellectual property with tangible property.

    Project Retrospective and Closure

    • Describe key similarities between traditional and online communities.
    • Evaluate ethical controversies affecting social networks.
    • Articulate ethical issues that may arise due to converging technologies.

    Cyberethics

    • Differentiate between cybertechnology and cyberethics.
    • Compare and contrast ethics and morality.
    • Specify a single comprehensive framework that incorporates key aspects of standard ethical theories.

    Critical Reasoning, Professional Ethics and Privacy in Cyberspace

    • Differentiate between valid logical arguments, claims, and statements.
    • Compare professional ethics with other kinds of applied ethics.
    • Explain personal privacy in the context of cybertechnology and the digital world.

    Security and Cybercrime

    • Explain what is meant by security in cybertechnology.
    • Differentiate between cybercrime and cyber-related crimes.
    • Assess free speech in relation to international governmental efforts to protect secrets.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.