Udemy caught selling a Python programming course with stolen content

By: (plus.google.com) +David Herron; Date: February 22, 2018

Tags: Udemy » Online Video

A semi-pro YouTuber found some of his instructional videos had been incorporated in a Udemy course. The response exposes a dark underbelly to Udemy that should cause one worries - how many of Udemy's courses are using stolen content? Does this raise a question whether Udemy is worthy of our support as customers?

A general principle is that when we spend money on a thing, we are supporting that thing. So when we buy a course from Udemy, we are supporting Udemy's existence. I think most or all of us hope for honesty and true value, so to learn that some courses in the Udemy catalog frauduently include stolen content is very troubling.

The issue arose about a week ago - A video posted on a YouTube channel named "Chris Hawkes" (presumably the guy in the videos is named Chris Hawkes) in which he showed a video in a Python course on Udemy containing one of his own videos.

This guy is a prolific video maker specializing in tutorial videos seemingly related to software development. He says (I haven't checked this) his body of work includes several full courses on Python and other programming languages.

What Chris Hawkes showed is a Udemy course with nearly 12,000 subscribers, containing a video directly out of his Python tutorial series. Hawkes was not credited anywhere in the video on Udemy, no link of any kind to his online properties existed, etc. In other words - simple blatant theft of his content.

The video in question has over 100,000 views on his channel. Who knows how many times the copy on Udemy was viewed, which directly translates to fewer views and diminished income on the official version.

He also mentions someone who'd done videos on Pluralsight, whose videos had been scrubbed of identifying marks and inserted into a Udemy course. In other words, this instance of theft in a Udemy course is not an isolated case.

Udemy is a big operation. They should be aware that some of their Instructors are going to skirt the edges of legitimacy, and therefore Udemy should have some kind of validation effort to prevent this sort of theft. YouTube has several processes to detect stolen content - Udemy should do something themselves.

Udemy claims to have over 65,000 courses in their catalog. That catalog does include some top notch courses of high value. In other words, Udemy is becoming a powerhouse in the online training marketplace. Which behooves Udemy to make the effort to ensure legitimacy in the course catalog offered through Udemy.

I can say as a Udemy customer that I've not bought any course that gave any hint of using stolen content. In every course I've taken, the instruction was by a clearly defined set of people. But any time I buy a course on Udemy, I'm carefully looking at the courses weighing among several factors including whether the course seems legitimate.

In retrospect that care I've been taking to choose courses on Udemy indicates I had an intuitive sense that something wasn't right at Udemy. I browse the course catalog half expecting to get screwed by weak courses that aren't going to teach anything of value. I'm happy to say the courses I have chosen weren't that bad - that is, I haven't taken a course that was an outright waste of time. In most cases the courses have been interesting and informative, with a couple where the instructor was dreadfully boring and not so informative but not a waste of time.

But - clearly Mr. Hawkes' report indicates not all is right in the land of Udemy.

« Is HTTPS Dangerous? HTTPS is incredibly useful but there may be critical flaws making it dangerous Eliminate certain annoying/suspicious/intrusive Windows 10 features »
2016 Election 2018 Elections Acer C720 Ad block Air Filters Air Quality Air Quality Monitoring AkashaCMS Amazon Amazon Kindle Amazon Web Services America Amiga and Jon Pertwee Android Anti-Fascism AntiVirus Software Apple Apple Hardware History Apple iPhone Apple iPhone Hardware April 1st Arduino ARM Compilation Artificial Intelligence Astronomy Astrophotography Asynchronous Programming Authoritarianism Automated Social Posting AWS DynamoDB AWS Lambda Ayo.JS Bells Law Big Brother Big Data Big Finish Big Science Bitcoin Mining Black Holes Blade Runner Blockchain Blogger Blogging Books Botnets Cassette Tapes Cellphones China China Manufacturing Christopher Eccleston Chrome Chrome Apps Chromebook Chromebox ChromeOS CIA CitiCards Citizen Journalism Civil Liberties Climate Change Clinton Cluster Computing Command Line Tools Comment Systems Computer Accessories Computer Hardware Computer Repair Computers Conservatives Cross Compilation Crouton Cryptocurrency Curiosity Rover Currencies Cyber Security Cybermen Cybersecurity Daleks Darth Vader Data backup Data Formats Data Storage Database Database Backup Databases David Tenant DDoS Botnet Department of Defense Department of Justice Detect Adblocker Developers Editors Digital Nomad Digital Photography Diskless Booting Disqus DIY DIY Repair DNP3 Do it yourself Docker Docker MAMP Docker Swarm Doctor Who Doctor Who Paradox Doctor Who Review Drobo Drupal Drupal Themes DVD E-Books E-Readers Early Computers eGPU Election Hacks Electric Bicycles Electric Vehicles Electron Eliminating Jobs for Human Emdebian Encabulators Energy Efficiency Enterprise Node EPUB ESP8266 Ethical Curation Eurovision Event Driven Asynchronous Express Face Recognition Facebook Fake News Fedora VirtualBox Fifth Doctor File transfer without iTunes FireFly Flash Flickr Fraud Freedom of Speech Front-end Development G Suite Gallifrey Gig Economy git Github GitKraken Gitlab GMAIL Google Google Chrome Google Gnome Google+ Government Spying Great Britain Green Transportation Hate Speech Heat Loss Hibernate High Technology Hoax Science Home Automation HTTP Security HTTPS Human ID I2C Protocol Image Analysis Image Conversion Image Processing ImageMagick In-memory Computing InfluxDB Infrared Thermometers Insulation Internet Internet Advertising Internet Law Internet of Things Internet Policy Internet Privacy iOS iOS Devices iPad iPhone iPhone hacking Iron Man iShowU Audio Capture iTunes Janet Fielding Java JavaFX JavaScript JavaScript Injection JDBC John Simms Journalism Joyent Kaspersky Labs Kext Kindle Kindle Marketplace Large Hadron Collider Lets Encrypt LibreOffice Linux Linux Hints Linux Single Board Computers Logging Mac Mini Mac OS Mac OS X MacBook Pro Machine Learning Machine Readable ID Macintosh macOS macOS High Sierra macOS Kext MacOS X setup Make Money Online Make Money with Gigs March For Our Lives MariaDB Mars Mass Violence Matt Lucas MEADS Anti-Missile Mercurial MERN Stack Michele Gomez Micro Apartments Microsoft Military AI Military Hardware Minification Minimized CSS Minimized HTML Minimized JavaScript Missy Mobile Applications Mobile Computers MODBUS Mondas Monetary System MongoDB Mongoose Monty Python MQTT Music Player Music Streaming MySQL NanoPi Nardole NASA Net Neutrality Network Attached Storage Node Web Development Node.js Node.js Database Node.js Performance Node.js Testing Node.JS Web Development Node.x North Korea npm NVIDIA NY Times Online advertising Online Community Online Fraud Online Journalism Online Photography Online Video Open Media Vault Open Source Open Source and Patents Open Source Governance Open Source Licenses Open Source Software OpenAPI OpenJDK OpenVPN Palmtop PDA Patrick Troughton PayPal Paywalls Personal Flight Peter Capaldi Peter Davison Phishing Photography PHP Plex Plex Media Server Political Protest Politics Postal Service Power Control President Trump Privacy Private E-mail server Production use Public Violence Raspberry Pi Raspberry Pi 3 Raspberry Pi Zero ReactJS Recaptcha Recycling Refurbished Computers Remote Desktop Removable Storage Republicans Retro Computing Retro-Technology Reviews RFID Rich Internet Applications Right to Repair River Song Robotics Robots Rocket Ships RSS News Readers rsync Russia Russia Troll Factory Russian Hacking Rust SCADA Scheme Science Fiction SD Cards Search Engine Ranking Season 1 Season 10 Season 11 Security Security Cameras Server-side JavaScript Serverless Framework Servers Shell Scripts Silence Simsimi Skype SmugMug Social Media Social Media Networks Social Media Warfare Social Network Management Social Networks Software Development Software Patents Space Flight Space Ship Reuse Space Ships SpaceX Spear Phishing Spring Spring Boot Spy Satellites SQLite3 SSD Drives SSD upgrade SSH SSH Key SSL Stand For Truth Strange Parts Swagger Synchronizing Files Tegan Jovanka Telescopes Terrorism The Cybermen The Daleks The Master Time-Series Database Tom Baker Torchwood Total Information Awareness Trump Trump Administration Trump Campaign Twitter Ubuntu Udemy UDOO US Department of Defense Video editing Virtual Private Networks VirtualBox VLC VNC VOIP Vue.js Walmart Weapons Systems Web Applications Web Developer Resources Web Development Web Development Tools Web Marketing Webpack Website Advertising Weeping Angels WhatsApp William Hartnell Window Insulation Windows Windows Alternatives Wordpress World Wide Web Yahoo YouTube YouTube Monetization