In MIT’s Experiential Ethics summer course, students grapple with real-world ethical decision making, often while interning in the very fields they’re studying.

Design decisions often treat people unequally. Take a bicycle, for instance. Bicycles offer a relatively inexpensive, healthy, and environmentally friendly mode of transportation for billions of people around the world. Yet each bicycle that hits the market automatically excludes those living with certain disabilities.

“Even with the most benevolent technology, no matter how well-intentioned we are ethically, we are still inevitably being discriminatory,” says rising MIT senior Teresa Gao, who is double-majoring in computer science and brain and cognitive sciences.

 

This concept of discriminatory design was one Gao and about 40 other MIT students explored this summer in 24.133 (Experiential Ethics), a 10-week course offered by the MIT Schwarzman College of Computing’s Social and Ethical Responsibilities of Computing group, the Office of Experiential Learning, and the Department of Linguistics and Philosophy.

 

Now in its third year, the course covers ethical concepts and frameworks — such as the relationship between science, technology, and justice and how to navigate ethical conflicts responsibly — while challenging students to consider those principles during their day-to-day work at summer internships, jobs, or research experiences.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

1 semaine ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

1 semaine ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

2 semaines ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

2 semaines ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

2 semaines ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

2 semaines ago

This website uses cookies.