- Level Foundation
- Duration 19 hours
- Course by CertNexus
-
Offered by
About
Data-driven technologies like AI, when designed with ethics in mind, benefit both the business and society at large. But it’s not enough to say you will “be ethical” and expect it to happen. We need tools and techniques to help us assess gaps in our ethical behaviors and to identify and stop threats to our ethical goals. We also need to know where and how to improve our ethical processes across development lifecycles. What we need is a way to manage ethical risk. This third course in the Certified Ethical Emerging Technologist (CEET) professional certificate is designed for learners seeking to detect and mitigate ethical risks in the design, development, and deployment of data-driven technologies. Students will learn the fundamentals of ethical risk analysis, sources of risk, and how to manage different types of risk. Throughout the course, learners will learn strategies for identifying and mitigating risks. This course is the third of five courses within the Certified Ethical Emerging Technologist (CEET) professional certificate. The preceding courses are titled Promote the Ethical Use of Data-Driven Technologies and Turn Ethical Frameworks into Actionable Steps.Modules
Overview
4
Videos
- Detect and Mitigate Ethical Risks Course Introduction
- CEET Specialization Introduction
- Course Welcome & Success Tips
- The Importance of Managing Risks
2
Readings
- Overview
- Get help and meet other learners. Join your Community!
Risk and Ethics
5
Videos
- Risk Management Process
- Risk Identification
- Risk Analysis
- Risk Mitigation
- Types of Ethical Risk
1
Readings
- Risk Management Frameworks
Basic Statistics
6
Videos
- Distributions
- Central Tendency
- Variance and Standard Deviation
- Skewness and Kurtosis
- Correlation
- Probability
Evaluation Metrics
4
Videos
- Machine Learning Outcomes
- Cost Functions
- Reliability
- Goodhart's Law
1
Readings
- Classification Metrics
Evaluate What You've Learned
1
Assignment
- Analyzing Ethical Risks
1
Discussions
- Reflect on What You've Learned
Overview
1
Videos
- The Importance of Managing Privacy Risks
1
Readings
- Overview
Sources of Privacy Risks
4
Videos
- Private Data
- First-Party vs. Third-Party Data
- Secondary Use of Data
- Combined Data Sources
Identifying Privacy Risks
4
Videos
- Identify Personally Identifiable Information (PII)
- Model Personas
- Track Customer Data
- Meet Compliance Requirements
1
Readings
- Data Protection Policies
Mitigation Strategies for Privacy Risks
4
Videos
- Intent and Consent
- Minimize Private Data Sharing
- Give the User Choices
- Minimize Private Data Collection
Toolkit for Managing Privacy Risks
4
Videos
- Reinforce Trust
- Anonymization and Pseudonymization
- Homomorphic Encryption
- Zero-Knowledge Protocols
1
Readings
- Privacy Legislation Sources
Evaluate What You've Learned
1
Assignment
- Managing Privacy Risks
1
Discussions
- Reflect on What You've Learned
1
Videos
- Incorporate Privacy Risk Management in the Lifecycle
Overview
1
Videos
- The Importance of Managing Accountability Risks
1
Readings
- Overview
Sources of Accountability Risks
4
Videos
- Use of Third-Party Components
- Automation Bias
- Extrajudicial Judgment
- Lack of Guiding Principles
Identifying Accountability Risks
2
Videos
- Recognize Black Box Algorithms
- Assess the Organization's Governance Structure
Mitigation Strategies for Accountability Risks
1
Peer Review
- Create a RACI Matrix
6
Videos
- Document and Distribute Company Policies
- Document Design Processes
- Document Auditing Processes
- Responsibility Assignment Matrix (RAM/RACI)
- Pilot Testing
- Collaboration with Data Sharing Partners
Toolkit for Managing Accountability Risks
3
Videos
- Algorithmic Impact Assessment (AIA)
- Data Visualization
- Dashboard Reporting
Evaluate What You've Learned
1
Assignment
- Managing Accountability Risks Quiz
1
Discussions
- Reflect on What You've Learned
1
Videos
- Incorporate Accountability Risk Management in the Lifecycle
Overview
1
Videos
- The Importance of Managing Transparency and Explainability Risks
1
Readings
- Overview
Sources of Transparency and Explainability Risks
5
Videos
- Black Box Systems
- Self-Learning Models
- Third-Party Integration
- Intellectual Property Rights
- Shadow Banning
Identifying Transparency and Explainability Risks
3
Videos
- Explainable AI
- Identify Algorithmic Decisions
- Deconstruct Specific Decisions
Mitigation Strategies for Transparency and Explainability Risks
5
Videos
- Explain How Systems Work
- Help Users Seeking Explanations
- Keep Humans in the Loop
- Ensure Proper Data Disclosure
- Be Upfront About Training Data Inadequacies
Toolkit for Managing Transparency and Explainability Risks
1
Labs
- Explaining a Decision Tree Using ELI5
2
Videos
- SHAP and Alibi
- ELI5, LIME, and What-If
Evaluate What You've Learned
1
Assignment
- Managing Transparency and Explainability Risks Quiz
1
Discussions
- Reflect on What You've Learned
1
Readings
- Incorporate Transparency and Explainability Risk Management in the Lifecycle
Overview
1
Videos
- The Importance of Managing Fairness and Non-Discrimination Risks
1
Readings
- Overview
Sources of Fairness and Non-Discrimination Risks
6
Videos
- Implicit Bias
- Sampling Bias
- Reinforcement Bias
- Temporal Bias
- Overfitting to Training Data
- Edge Cases and Outliers
Identifying Fairness and Non-Discrimination Risks
3
Videos
- Analytical Techniques
- Analyze Models in Different Environments
- Persona Modeling
Mitigation Strategies for Fairness and Non-Discrimination Risks
4
Videos
- Inclusive Design and Foreseeability
- STEEPV Analysis
- Perform User Testing
- Gather Input from External Stakeholders
1
Readings
- Pattern Matching vs. Bias
Toolkit for Managing Fairness and Non-Discrimination Risks
3
Videos
- Bias and Safety Bounties
- AI Fairness 360
- Radioactive Data Tracing
1
Readings
- AI Fairness 360 Demo
Evaluate What You've Learned
1
Assignment
- Managing Fairness and Non-Discrimination Risks
1
Discussions
- Reflect on What You've Learned
1
Videos
- Incorporate Fairness and Non-Discrimination Risk Management in the Lifecycle
Overview
1
Videos
- The Importance of Managing Safety and Security Risks
1
Readings
- Overview
Sources of Safety and Security Risks
5
Videos
- Abnormal System Behavior
- Adversarial Machine Learning
- Bad Actors
- Groupthink and Biases
- Cyber Attacks
Identifying Safety and Security Risks
6
Videos
- Quantitative Risk Analysis
- Evaluate Training Data and Models
- Threat Intelligence
- Threat Modeling
- Penetration Testing
- Forensic Analysis
Mitigation Strategies for Safety and Security Risks
5
Videos
- Ensure Critical AI Systems Follow Rigorous Standards
- Establish Baseline System Behavior
- Designate Rapid Response Teams
- Protect the Security of Data in Storage
- Protect the Security of Data in Transit
Toolkit for Managing Safety and Security Risks
5
Videos
- Threat and Risk Libraries
- Threat Modeling and Analysis Tools
- Attack Simulation Tools
- Vulnerability Scoring Tools
- Security Information and Event Management (SIEM)
Evaluate What You've Learned
1
Assignment
- Managing Safety and Security Risks Quiz
1
Discussions
- Reflect on What You've Learned
1
Videos
- Incorporate Safety and Security Risk Management in the Lifecycle
Project
1
Peer Review
- Algorithmic Impact Assessment (AIA)
Honors Project (Optional)
1
Peer Review
- Ethical AI Project Plan
Auto Summary
Discover how to detect and mitigate ethical risks in AI and data science with this foundational course by Coursera. Led by experts, you'll learn to assess and manage ethical risks throughout the development lifecycle of data-driven technologies. This 1140-minute course is part of the Certified Ethical Emerging Technologist (CEET) professional certificate, ideal for those looking to ensure ethical practices in tech. Available under Starter and Professional subscription options, it’s perfect for anyone keen on integrating ethical risk management into their skillset.

Renée Cummings

Jennifer Fischer

Eleanor 'Nell' Watson