The document discusses 9 cases involving ethical issues that computer professionals may face. It analyzes each case using principles from codes of ethics like the ACM code. The cases cover issues like privacy, conflicts of interest, software quality, discrimination, and unauthorized access. The analysis shows how ethics codes can help professionals balance competing factors to make ethical decisions, even in constrained situations. Leadership plays a key role by setting an ethical tone.
It presents various approximation schemes including absolute approximation, epsilon approximation and also presents some polynomial time approximation schemes. It also presents some probabilistically good algorithms.
A Support Vector Machine (SVM) is a discriminative classifier formally defined by a separating hyperplane. In other words, given labeled training data (supervised learning), the algorithm outputs an optimal hyperplane which categorizes new examples. In two dimentional space this hyperplane is a line dividing a plane in two parts where in each class lay in either side.
We are hiring IT professionals with telecom domain knowledge across the experience range and multiple technologies for Vodafone's Shared Service Centres in Pune and Bangalore. I am sharing this information for the benefit of my network.
It presents various approximation schemes including absolute approximation, epsilon approximation and also presents some polynomial time approximation schemes. It also presents some probabilistically good algorithms.
A Support Vector Machine (SVM) is a discriminative classifier formally defined by a separating hyperplane. In other words, given labeled training data (supervised learning), the algorithm outputs an optimal hyperplane which categorizes new examples. In two dimentional space this hyperplane is a line dividing a plane in two parts where in each class lay in either side.
We are hiring IT professionals with telecom domain knowledge across the experience range and multiple technologies for Vodafone's Shared Service Centres in Pune and Bangalore. I am sharing this information for the benefit of my network.
This presentation is about top IT professional certification programs in the world. Here you can learn about certification centers and programs across different cities of Ukraine.
How the Distribution of New Faculty Training Can Affect Participation and Eng...Scott Dinho
Presentation made to Instructional Technology Council's eLearning 2010 conference. The presentation discusses how distributing the faculty development training throughout a term has a positive impact on faculty development as opposed to only training faculty once at the start of a term.
Preventing Problems before They Happen with Customized Language Packs (2012)Scott Dinho
Presentation made at Blackboard World 2012 conference. This brief presentation shows how the internal text and instructions within Blackboard can be modified to provide just in time instruction and helpful info to students and instructions that should cut down on calls to the help desk.
How to Integrate Course Design and Support without Really Trying (2007)Scott Dinho
Presentation made at Instructional Technology Council's eLearning 2007 conference. The presentation discusses "Instructor's Notes," a document created to document instructional design intentions of a master course that can be accessed by an y professor teaching from the master course at a later time.
Tumo - From Startup to Business by Haig Kayserianhaigkayserian
KAYWEB Angels CEO, Haig Kayserian delivered a talk at Tumo Center for Creative Technologies in Yerevan, Armenia.
It was titled: From Startup to Business
Charla presentada en la SG Virtual Conference el 27 de abril de 2016 dónde se ofrece una perspectiva de lo que son los productos innovadores basados en datos y en ciencia de datos.
How To Save Money on Carrier Management Services Across Your EnterprisePostal Advocate Inc.
Postal Advocate manages the carrier management spends with organizations that could have hundreds to thousands of locations that need to be managed to control their carrier cost. Most of the spend never touches a shipping center, is not a core shipping function (including documents, samples, computers, labs, etc.), and will be processed by end users with little experience. This creates unique challenges and opportunities for savings that often get missed.
At a corporate level, many organizations will use a third-party company to audit their carrier bills, looking for late shipments or items that do not adhere to their contract. Some entities may also use a service to help negotiate their rates. Where we see the biggest gap is the way the spend is managed inside the organization that can have the largest impact on costs. This webinar focused on the top things you can do to create better controls and optimize the spend.
Items We Covered:
1.) Administrative Challenges
2.) Account Management
3.) User Management
4.) Rights Management
5.) Local Questions/Issues Resolution
6.) Reporting
7.) Technology Options
8.) Best Practices and Tips
ACS Code of Professional Conduct Case Studies .docxbobbywlane695641
ACS Code of Professional Conduct Case Studies
Australian Computer Society
April 2014
Australian Computer Society | ACS Code of Professional Conduct Case Studies | March 2014 Page 2
Title
ACS Code of Professional Conduct Case Studies
Authors
Committee on Computer Ethics Mike Bowern
Version History
Date Document
Version
Revision History (reason for change) Author /Reviser
July 2012 2.0 ACS Branding Sarah Li
April 2014 2.1 Updated to refer Code of Professional
Conduct
Graham Low
Approvals
Date approved Version Approved By Date in force Date of Next
Review
17 July 2012 2.0 Ruth Graham 17 July 2012 To be confirmed
4 April 2014 2.1 Michael Johnson 4 April 2014 To be confirmed
Custodian title &
e-mail address:
[email protected]
Responsible
Business Group:
Professional Standards, Learning & Development
Distribution:
General (no restriction on distribution)
Content Security:
Unclassified
Australian Computer Society | ACS Code of Professional Conduct Case Studies | March 2014 Page 3
ACS CODE OF PROFESSIONAL CONDUCT CASE STUDIES
This document provides a range of case studies1 with references to relevant clauses of the
ACS Code of Professional Conduct. Section 1.2 describes the Code of Professional Conduct,
summarised as six values: The Primacy of the Public Interest; The Enhancement of the
Quality of Life; Honesty; Competence; Professional Development; and Professionalism.
Sections 1.2.1 through to 1.2.6 provide a series of non-exhaustive requirements explaining
how the six values relate to a member’s professional work.
Case No. 1: Jean The Programmer [1]
Summary of case
Jean, a statistical database programmer, is trying to write a large statistical program needed by
her company. Programmers in this company are encouraged to write about their work and to
publish their algorithms in professional journals. After months of tedious programming, Jean
has found herself stuck on several parts of the program. Her manager, not recognising the
complexity of the problem, wants the job completed within the next few days. Not knowing
how to solve the problems, Jean remembers that a co-worker had given her source listings
from his current work and from an early version of a commercial software package developed
at another company. On studying these programs, she sees two areas of code which could be
directly incorporated into her own program. She uses segments of code from both her co-
worker and the commercial software, but does not tell anyone or mention it in the
documentation. She completes the project and turns it in a day ahead of time.
ACS Code of Professional Conduct values and relevant clauses of the Code of Professional
Conduct
1.2.1 Public Interest
a) identify those potentially impacted by your work and explicitly consider their interests;
f) respect the intellectual property of others;
1.2.4 Competence
b) not mis.
ACS Code of Professional Conduct Case Studies .docxnettletondevon
ACS Code of Professional Conduct Case Studies
Australian Computer Society
April 2014
Australian Computer Society | ACS Code of Professional Conduct Case Studies | March 2014 Page 2
Title
ACS Code of Professional Conduct Case Studies
Authors
Committee on Computer Ethics Mike Bowern
Version History
Date Document
Version
Revision History (reason for change) Author /Reviser
July 2012 2.0 ACS Branding Sarah Li
April 2014 2.1 Updated to refer Code of Professional
Conduct
Graham Low
Approvals
Date approved Version Approved By Date in force Date of Next
Review
17 July 2012 2.0 Ruth Graham 17 July 2012 To be confirmed
4 April 2014 2.1 Michael Johnson 4 April 2014 To be confirmed
Custodian title &
e-mail address:
[email protected]
Responsible
Business Group:
Professional Standards, Learning & Development
Distribution:
General (no restriction on distribution)
Content Security:
Unclassified
Australian Computer Society | ACS Code of Professional Conduct Case Studies | March 2014 Page 3
ACS CODE OF PROFESSIONAL CONDUCT CASE STUDIES
This document provides a range of case studies
1
with references to relevant clauses of the
ACS Code of Professional Conduct. Section 1.2 describes the Code of Professional Conduct,
summarised as six values: The Primacy of the Public Interest; The Enhancement of the
Quality of Life; Honesty; Competence; Professional Development; and Professionalism.
Sections 1.2.1 through to 1.2.6 provide a series of non-exhaustive requirements explaining
how the six values relate to a member’s professional work.
Case No. 1: Jean The Programmer [1]
Summary of case
Jean, a statistical database programmer, is trying to write a large statistical program needed by
her company. Programmers in this company are encouraged to write about their work and to
publish their algorithms in professional journals. After months of tedious programming, Jean
has found herself stuck on several parts of the program. Her manager, not recognising the
complexity of the problem, wants the job completed within the next few days. Not knowing
how to solve the problems, Jean remembers that a co-worker had given her source listings
from his current work and from an early version of a commercial software package developed
at another company. On studying these programs, she sees two areas of code which could be
directly incorporated into her own program. She uses segments of code from both her co-
worker and the commercial software, but does not tell anyone or mention it in the
documentation. She completes the project and turns it in a day ahead of time.
ACS Code of Professional Conduct values and relevant clauses of the Code of Professional
Conduct
1.2.1 Public Interest
a) identify those potentially impacted by your work and explicitly consider their interests;
f) respect the intellectual property of others;
1.2.4 Competence
b) not.
Process Mining and AI for Continuous Process ImprovementMarlon Dumas
Talk delivered at BPM Day Rio Grande do Sul on 11 November 2021.
Abstract.
Process mining is a technology that marries methods from business process management and from data science, to support operational excellence and digital transformation. Process mining tools can transform data extracted from enterprise systems, into visualizations and reports that allow managers to improve organizational performance along different dimensions, such as efficiency, quality, and compliance. In this talk, we will give an overview of the capabilities of process mining tools, and we will illustrate the benefits of process mining via several case studies in the fields of insurance, manufacturing, and IT service management.
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
Businesses involved in mergers and acquisitions must exercise due diligence in ensuring that the technology environment of the future organization is robust and adequately protects their information assets and intellectual property.. Such an effort requires time and open sharing to understand the physical locations, computing environment, and any gaps to address. Lack of information sharing can lead to a problematic systems integration and hamper the building of a cohesive enterprise security posture for the merged organization.
Often the urgency of companies undergoing a merger and acquisition (M&A) impedes comprehensive due diligence, especially in cybersecurity. This creates greater challenges for the cybersecurity engineering architect, who typically leads the cybersecurity assessment effort and creates the roadmap for the new enterprise security solution for the future organization. However, the business interest and urgency in completing the merger can also represent an opportunity for CISOs to leverage additional resources and executive attention on strategic security matters.
In this project, you will create a report on system security issues during an M&A. The details of your report, which will also include an executive briefing and summary, can be found in the final step of the project.
There are nine steps to the project. The project as a whole should take two weeks to complete. Begin with the workplace scenario and then continue to Step 1.
Deliverable
Cybersecurity for a Successful Acquisition, Slides to Support Executive Briefing
Step 1: Conduct a Policy Gap Analysis
As you begin Step 1 of your system security report on cybersecurity for mergers and acquisitions, keep in mind that the networks of companies going through an M&A can be subject to cyberattack. As you work through this step and the others, keep these questions in mind:
Are companies going through an M&A prone to more attacks or more focused attacks?
If so, what is the appropriate course of action?
Should the M&A activities be kept confidential?
Now, look at the existing security policies in regard to the acquisition of the media streaming company. You have to explain to the executives that before any systems are integrated, their security policies will need to be reviewed.
Conduct a policy gap analysis to ensure the target company's security policies follow relevant industry standards as well as local, state, and national laws and regulations. In other words, you need to make sure the new company will not inherit any statutory or regulatory noncompliance from either of the two original companies. This step would also identify what, if any, laws and regulations the target company is subject to. If those are different from the laws and regulations the acquiring company is subject to, then this document should answer the following questions:
How would you identify the differences?
How would you learn about the relevant laws and regulations?
How would .
Internal auditors regularly access organization information for audit purposes. Many organizations now maintain computerized data warehouses containing useful management and financial information. Audit professionals therefore need to understand both the concepts of data warehousing as well as data mining techniques.
Data warehousing is a process for assembling and managing data from various sources for the purpose of gaining a single, detailed view of part or all of a business.
Data mining is the use of automated tools to explore and analyze large amounts of data stored in those data warehouses.
Print reports represent a valuable source of unstructured data which can be useful for internal auditors. Using print reports for data mining will be the main area covered in this Webinar.
Objectives
1. Identify the difference between data analysis and data mining Understand the importance between structured and unstructured data
2. Learn tips and best practices for data mining print reports
3. Understand how excel and IDEA handle importing different PDF formats
4. How to use templates to make future imports a one button task
Question #1 (20 points) As you know, there are several ways to m.docxamrit47
Question #1 (20 points) As you know, there are several ways to migrate from one system to another. First, describe each of the methods that can be used.
When change accounting systems organizations have two options which are applicable to implement the change as they anticipate it to be. The company can choose;
i) Complete change, here they are required to throw away the old system and implement the new one. Under this method, the operations are brought to a standstill as they implement it.
ii) Phase by phase change, here the organization is required to do it as per department. They are required to select a pilot project. This is done to test whether the system being selected is suitable and can deliver as per their plans. This helps in developing the systems before they are put in place.
Secondly, describe the advantages of each method. Next, describe the disadvantages to each method.
Advantages of complete change
1. It helps in consistency of operations.
2. It saves on time and cost associated with Change period.
Disadvantages of complete change
1. Operations are stopped during the implementation of the
2. In case the system fails to work the operations are affected
3. Low productivity due lack of training and low competence of the new system
Advantages of phase by phase
1. It allows time for testing the suitability of the system before its implemented to all departments
2. It allows time for staff training as they implement it in each department.
3. It reduces the stoppage time in case of breakdown as opposed to when implemented across the whole company systems.
Disadvantages
1. In case it fails it, the department is left behind as they try to reintroduce the old systems
2. It consumes a lot of time before its put in place in the entire company systems.
Finally, identify and discuss the pros & cons of purchasing a commercial-off-the-shelf accounting system vs building one from scratch.
The advantages of a commercial-off-the-shelf accounting system include:
Cost: since the off the shelf product is produced for market, the economies of scale dictate that it will be less expensive to acquire than a custom system.
Customer support: Many commercial-off-the-shelf systems come from reputable companies that provide customer support to clients. Previous clients might have experienced certain common problems which will be logged with the company. This will ensure fast resolution of nay arising difficulties.
Reliability: Before gaining federal approval, commercial-off-the-shelf products undergo rigorous testing to ensure they fulfill all the requirements set out for the programs. This is particularly important as there will be no time wasted on resolving development glitches that affect all new software.
Although there are a lot of advantages to commercial-off-the-shelf there are also some disadvantages. These include:
Failure to meet specific needs: Unlike custom built systems, commercial-off-the-shelf tend to focus mainly on ar ...
Integrated Receivables: 5 Critical Factors For Adoption3 Point Alliance
In this paper, we outline five critical factors for adopting an Integrated Receivables (IR) solution that would provide many benefits to companies looking to streamline receivables processing such as cash acceleration and increasing straight-through processing (STP) rates. We discuss how the payments landscape is changing for AR/AP professionals and why companies have been slow to adopt integrated receivables.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfJay Das
With the advent of artificial intelligence or AI tools, project management processes are undergoing a transformative shift. By using tools like ChatGPT, and Bard organizations can empower their leaders and managers to plan, execute, and monitor projects more effectively.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
2. Ethical Decision Making: Case 3
• Sana works in a large provincial agency dealing with
alcoholism and drug abuse.
• Agency administers programs for individuals with alcohol and
drug programs.
– Maintains a large database of information on clients who use agency
services.
– Some data files contain names and current addresses of clients.
• Sana has been asked to look at the track records of treatment
programs.
– Reporting # of clients seen each month for past five years, length of
client treatment, number of clients who return after program
completion, criminal histories of clients.
3. Ethical Decision Making: Case 3
• Sana has been given access to all files in the agency’s
mainframe computer
– This data is needed to put together in the report.
• After assembling data:
– She downloads it to the computer in her office.
• The agency is pressuring her to finish report on the deadline.
– Sana decides she must work from home over the weekend.
– She copies data onto several disks and takes them home.
– After finishing report she leaves the disks at home and forgets about
them.
4. Applying the Code: Case 3
• This case resembles case 2, but raises several additional
issues.
• Issues involving confidentiality
– Principle 1.7 deals with privacy
– Principle 1.8 deals with confidentiality
• Principle 2.8 also applies:
– Constraining access to authorized systems
• Principle 3.5:
– Organizational leaders have obligations to “verify systems are
designed and implemented to protect personal privacy and enhance
personal dignity”
• Also Principle 3.3:
– (Appropriate and authorized uses of organization’s resources)
5. Applying the Code: Case 3
• Government agency should have had policies and procedures
to protect identity of its clients
– Sana’s friends and relatives might accidentally discover files and
inappropriate uses information.
– Note that the files Sana used did not need to have names or other
information in the records.
• Agency should have removed identifying information from
files Sana was allowed to use.
– If this happened, it wouldn’t have mattered that Sana copied files to
her computer.
• Sana, unfortunately, was not attentive to ethical issues ahead
of time.
6. Ethical decision making: Case 4
• Computer company is writing first part of an “efficient
accounting system”.
– Will be used by government.
– Expectation is that this will save taxpayers a considerable amount of
money each year.
• Software engineer in charge of design assigns different parts
of system to his staff.
– Reports, Internal Processing, User interface
• Manager is shown the system, and agrees it matches
requirements.
• System is installed, but staff find the interface so difficult to
use that their complaints are heard by upper-level
management
7. Ethical Decision Making: Case 4
• Result of complaints:
– upper-level management will not invest any more
money in developing the new accounting system
– they go back to their original, more expensive
system
8. Applying the Code: Case 4
• This case highlights issues involving quality of professional
work
• Code of Ethics advocates that:
– professional strive to achieve the highest quality in both process and
products (2.1)
• Principle 3.4: users and those affected by a system must have
their needs clearly articulated
• Assumption in this case:
– Failure to deliver a quality product is directly attributable to failure to
follow a quality process.
– Most likely the problems with interface could have been discovered in
review process – peers or users (2.4)
• When harm results (in this case with taxpayers), failure to
implement quality process clearly violates ethical behavior.
9. Ethical decision making: Case 5
• Contractor is determining requirements for an
employment agency.
– Client describes what is needed when displaying
applications whose qualifications appear to match those
for a particular job.
– Client also further states that names of white applicants
are to be displayed ahead of nonwhites.
– Further states that names of male applicants are to be
displayed ahead of female applicants.
• Recall: ethical code asserts an ACM member will be
“fair and take action not to discriminate”
10. Applying the Code: Case 5
• This case highlights issues involving fairness and
discrimination
• In this case, system designer is asked to build a system that, it
appears
– will be used to favour white males and
– discriminate against non-whites and females
• From this is would appear that:
– system designer should not do what he or she is told, plus
– should also point out the problematic nature of what is being
requested and ask client why this is being done
• Making the inquiry is consistent with 2.3, 2.5 and 4.1.
11. Applying the Code: Case 5
• If client answers that they plan to use information to
favour white males, then:
– Computer professional should refuse to build the system
as proposed.
• To go ahead and build the system would violate:
– 1.4 (fairness)
– 2.3 (respecting existing laws)
• It would also be inconsistent with:
– 1.1 (well-being)
– 1.2 (avoiding harm)
12. Ethical decision making: Case 6
• A software development company has just produced
a new software package.
– It incorporates new tax laws and prepares both individual
and small business tax returns
• The president of the company knows that the
program has a number of bugs
– He also believes the first firm to put this kind of software
on the market is likely to capture the largest market share.
• The company widely advertises the package.
– When the product is shipped, it includes a disclaimer of
responsibility for errors resulting from the use of the
program.
13. Ethical decision making: Case 6
• The company expects it will receive a number of complaints,
queries, and suggestions for modification.
• The company plans to use these to make changes and
eventually issue updated, improved and debugged versions.
• The president argues that this is general industry policy:
– “Anyone who buys version 1.0 of a program knows this and will take
proper precautions.”
• Because of bugs, a number of users filed incorrect tax returns
and were penalized by Rev Canada.
14. Applying the Code: Case 6
• This case highlights issues involving legal liability for
unreliable code
• Software company (and president in particular) violated
several principles in the ACM code of ethics
• Since he was aware of bugs in the product, he did not strive
to achieve the highest quality (Principle 2.1)
• By failing to inform consumers about bugs to system,
principle 2.5 was violated.
• Here the risks to users is so great they have to pay penalties
for mistakes which result from the program.
– By law companies can make disclaimers only when they are in “good
conscience” (Disclaimer does not meet legal test, violated principle
2.3)
• President also violates Principle 3.1
15. Ethical decision making: Case 7
• Small software company is working on an integrated
inventory control system
– very large national shoe manufacturer
– system gathers sales data daily from stores across Canada
• Data is used by following departments:
– accounting
– shipping
– ordering
• Inventory functions are critical to the smooth
operation of the system and the corporation.
16. Ethical decision making: Case 7
• James is a quality assurance (QA) engineer with the
software company
– He suspects the inventory functions of the system are not
sufficiently tested
– However, they have passed all contracted tests.
• He is being pressured by his employers to sign off on
the software.
• Legally he is only required to perform those tests
which found their way into the contract
• However, his considerable experience in software
testing leads him to be concerned over risks of
incorrect system behavior
17. Ethical decision making: Case 7
• Despite insisting, James’ company states:
– “We will go out of business if we do not deliver the
software on time.”
• James replies:
– “If inventory subsystem fails, it will significantly harm our
client and their employees.”
• If the potential failure were to threaten lives, it
would be clear to James that he should refuse to sign
off
• However, given the reduced degree of threatened
harm, James is faced by a difficult decision.
18. Applying the Code: Case 7
• This case highlights issues involving software risks.
• Principle 1.2 stress responsibility of computing
professional to avoid harm for others
– Principle 1.1 requires concern for human well-being
– Principle 1.3 mandates professional integrity
– Principle 2.1 defines quality as an ethical responsibility
• These principles may conflict with agreements and
commitments of an employee to the employer and
client.
19. Applying the Code: Case 7
• The ethical imperatives of the code suggest that:
– James should not deliver a product he believes to be
inferior
– nor should he mislead the client about the quality of the
product (1.3)
• He should continue to test, and has been told of the
financial repercussions of not delivering the system.
– At the very least, the client should be informed of his
reservations.
20. Ethical decision making: Case 8
• A software consultant is negotiating a contract
with a local municipality
• Designing their traffic control system (TCS)
• She recommends they select the TCS system
out of several available system on the market.
• The consultant fails to mention that she is a
major stockholder of the company producing
TCS software.
21. Applying the Code: Case 8
• This case highlights issues involving conflicts of interest.
• Principle 2.5: computer professionals must “strive to be
perceptive, thorough and objective when evaluating,
recommending and presenting system descriptions and
alternatives.”
• Principle 1.3: implies a computer professional must be honest
about “any circumstances that might lead to conflicts of
interest”
– IT professionals have special skills
– It is their responsibility to ensure clients are fully aware of the options.
– Also their responsibility to ensure professional recommendations are
not modified for personal gain.
22. Ethical decision making: Case 9
• Hugo is working on a project for his computer
science course.
• Instructor has allotted a fix amount of
computer time for the project.
– This time is enforced by the computer system.
• Hugo runs out of time, but has not yet
finished the project.
• Instructor cannot be reached.
23. Ethical decision making: Case 9
• Hugo worked last year as a co-op programmer
in the department.
• He is very familiar with procedures used to
increase time allocations to accounts.
• Using what he learned last year, he is able to
access the master account.
• Then he gives himself additional time.
• He now completes his project.
24. Applying the code: Case 9
• Principle 1.5 (property rights) has been violated.
• Principle 2.8: specifies that ACM members should
“access communication resources only when
authorized to do so”.
• By violating 2.8, Hugo is also violating Principle 2.3
(“know and respect existing laws”)
• As a student member of the ACM, Hugo must follow
the code of ethics…
• … even if he does not consider himself a computing
professional.
25. Nine cases: summary
• Illustrate broad range of issues facing an IT
professional.
– Code does not prescribe what an individual must do
– But it does identify some decisions as unacceptable.
• Ethical decision often involve balance amongst
several factors.
– Computer professionals therefore have to choose amongst
the conflicting principles.
– Goal is to ahead to the spirit as much as to the letter.
26. Nine cases: summary
• All of the cases also portrayed individuals
acting in constrained situations.
– Institutional environment usually influences
ethical decisions.
– Such environments can either facilitate or
constrain ethical behavior.
– Leadership roles set the tone.
– Some of the problems shown in the cases
resulting from a lack of ethical leadership.
27. Other applicable codes
• Canadian Information Processing Society (CIPS):
– Code of Ethics & Standards of Conduct
– http://www.cips.ca/about/ethics/english/ethics.pdf
• IEEE Computer Society & ACM:
– Software Engineering Code of Ethics and Professional
Practice
– http://www.computer.org/computer/code-of-ethics.pdf
• Council of Professional Engineers
– Guideline on the Code of Ethics
– http://www.ccpe.ca/e/files/guideline_code_with.pdf