Course Information
| Course Code | YPZ108 |
| Program | Artificial Intelligence Engineering |
| Language | Turkish |
| Level | Undergraduate |
| Type | Compulsory |
| Prerequisites | None |
| Theory | 2 Hours |
| Practice | — |
| Laboratory | — |
| Credits | 2.00 |
| ECTS | 3.00 |
| Instructor | Asst. Prof. Ramazan Özgür Doğan |
Course Objective
This course focuses on ethics in information technologies. IT ethics is examined from moral, legal, and social perspectives in relation to information technologies. The aim is to develop the ability to analyze security issues that may arise during the use of information technologies and to establish a proper perspective on ethical problems.
Course Content
Introduction to ethics and information technologies; ethical values and concepts; the structure of ethical theories. Professional ethics and responsibility. Security and network ethics. Privacy and internet environments; privacy and security. Intellectual property and ethical values; data protection. Copyright and patent protection methods; professional responsibility and license agreements. Security issues; hacking and cracking; cybercrimes and their social impacts; fundamental concepts of cyberspace and cybersecurity; cyber actors and attack methods; cyber defense methods. Jurisdiction issues in internet and computing environments. Electronic commerce. Entrepreneurship, innovation, sustainable development awareness, and IT ethics.
Weekly Schedule
| Week | Topic |
|---|---|
| 1 | Introduction to IT Ethics and Fundamental Concepts |
| 2 | Ethical Theories: Utilitarianism, Deontology, and Virtue Ethics |
| 3 | Professional Ethics and Cyber Technology |
| 4 | Management Approaches: Traditional Structure and Its Critique |
| 5 | The Concept of Privacy and Personal Data Protection |
| 6 | Privacy–Security Balance: The Surveillance Society |
| 7 | Intellectual Property: Copyright, Patent, and Trademark Law |
| 8 | License Agreements and IT Law |
| 9 | Midterm Exam |
| 10 | AI Ethics: Algorithms and Automated Decision-Making |
| 11 | Cybercrimes: Definitions and Cyberbullying |
| 12 | Cybersecurity, Network Security, and Cyber Defense Methods |
| 13 | Social Media Ethics, Algorithmic Manipulation, and Echo Chambers |
| 14 | Big Data Ethics, Data Mining, and Digital Activism |
| 15 | End-of-Semester Review |
| 16 | Final Exam |
Course Learning Outcomes
Upon successful completion of this course, students will be able to:
- Explain IT ethics and its fundamental concepts.
- Develop solutions for technology-related social conflicts of the information age.
- Explain information security, digital citizenship, and intellectual property concepts.
- Apply personal information security rules in professional life and organize their professional activities in accordance with the law.
- Apply privacy and security rules in their professional lives.
- Evaluate their behaviors and decisions regarding intellectual property rights.
- Take precautions against crimes related to internet and information technologies.
- Gain knowledge on responsibility, privacy, and cybersecurity topics.
Recommended Textbooks
- Tavani, H. T. (2007). Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. Wiley.
- Tavani, H. T. (2011). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. John Wiley & Sons.
- Winston, M., & Edelbach, R. (2011). Society, Ethics, and Technology. Cengage Learning.
- Barger, R. N. (2008). Computer Ethics: A Case-Based Approach. New York, NY: Cambridge University Press.
Course Materials
Interactive lecture slides are available at the link below.