SlideShare a Scribd company logo
1 of 17
Professional Issues in Computer Science
and Engineering
Three Case Studies for the ACM/IEEE-CS
Software Engineering Codes of Ethics
Name : Sami Ullah
&
Name : Mohib Ullah Sail
Three Codes of Ethics
• ACM Codes of Ethics and Professional Conduct:
http://www.acm.org/about/code-of-ethics
• ACM/IEEE-CS Software Engineering Code of Ethics and Professional
Practice http://www.acm.org/about/se-code
• The Ten Commandments of Computer Ethics
http://www.acm.org/about/se-code
• Three case studies: Gotterbarn, D. and Miller, K. W. 2004. Computer
ethics in the undergraduate curriculum: case studies and the joint
software engineer's code. J. Comput. Small Coll. 20, 2 (Dec. 2004), 156-
167, http://portal.acm.org/citation.cfm?id=1040168#
Principles of the SE Code
1 PUBLIC - Software engineers shall act consistently with the public interest.
2 CLIENT AND EMPLOYER - Software engineers shall act in a manner that is in the best interests
of their client and employer, consistent with the public interest.
3 PRODUCT - Software engineers shall ensure that their products and related modifications meet the
highest professional standards possible.
4 JUDGMENT - Software engineers shall maintain integrity and independence in
their professional judgment.
5 MANAGEMENT - Software engineering managers and leaders shall subscribe to and promote an
ethical approach to the management of software development and maintenance.
6 PROFESSION - Software engineers shall advance the integrity and reputation of the profession
consistent with the public interest.
7 COLLEAGUES - Software engineers shall be fair to and supportive of their colleagues.
8 SELF - Software engineers shall participate in lifelong learning regarding the
practice of their profession and shall promote an ethical approach to the practice of the profession.
Case Study 1
George Babbage is an experienced software developer working for Acme Software Company.
Mr. Babbage is now working on a project for the U.S. Department of Defense, testing the software
used in controlling an experimental jet fighter. George is the quality control manager for the
software. Early simulation testing revealed that, under certain conditions, instabilities would
arise that could cause the plane to crash. The software was patched to eliminate the specific
problems uncovered by the tests. After these repairs, the software passed all the simulation
tests.
George is not convinced that the software is safe. He is worried that the problems uncovered by
the simulation testing were symptomatic of a design flaw that could only be eliminated by an
extensive redesign of the software. He is convinced that the patch that was applied to remedy
the specific tests in the simulation did not address the underlying problem. But, when George
brings his concerns to his superiors, they assure him that the problem has been resolved. They
further inform George that any major redesign effort would introduce unacceptable delays,
resulting in costly penalties to the company.
There is a great deal of pressure on George to sign off on the system and to allow it to be flight
tested. It has even been hinted that, if he persists in delaying the system, he will be fired.
What should George do next?
Case Study 1: Relevant Clauses
• Principle 1. PUBLIC Software engineers shall act consistently with
the public interest. In particular, software engineers shall, as
appropriate:
• 1.03. Approve software only if they have a well-founded belief
that it is safe, meets specifications, passes appropriate tests, and
does not diminish quality of life, diminish privacy or harm the
environment. The ultimate effect of the work should be to the
public good.
• 1.04. Disclose to appropriate persons or authorities any actual or
potential danger to the user, the public, or the environment, that
they reasonably believe to be associated with software or related
documents.
Case Study 1: Relevant Clauses
• Principle 3. PRODUCT Software engineers shall ensure
that their products and related modifications meet the
highest professional standards possible. In particular,
software engineers shall, as appropriate:
• 3.10. Ensure adequate testing, debugging, and review of software
and related documents on which they work.
Case Study 1: Relevant Clauses
• Principle 5. MANAGEMENT Software engineering managers and
leaders shall subscribe to and promote an ethical approach to the
management of software development and maintenance. In particular,
those managing or leading software engineers shall, as appropriate:
• 5.01 Ensure good management for any project on which they work, including
effective procedures for promotion of quality and reduction of risk.
• 5.11. Not ask a software engineer to do anything inconsistent with this Code.
Applying the Code
• Whose safety?
• How safe?
• Safe enough! Professional judgement
• Management’s position
• “The standard supported by the Code is to have the burden to demonstrate
that the software is safe before deployment instead of having to prove it
unsafe before deployment is halted.”
Case Study 2
Leikessa Jones owns her own consulting business, and has several people working for her.
Leikessa is currently designing a database management system for the personnel office of ToyTimeInc., a mid-sized
company that makes toys. Leikessa has involved
ToyTimeInc management in the design process from the start of the project.
It is now time to decide about the kind and degree of security to build into the system.
Leikessa has described several options to the client. The client has decided to opt for the least secure system because the
system is going to cost more than was initially planned, and the least secure option is the cheapest security option.
Leikessa knows that the database includes sensitive information, such as performance evaluations, medical records,
and salaries. With weak security, she fears that enterprising ToyTimeInc employees will be able to easily access this
sensitive data. Furthermore, she fears that the
system will be an easy target for external hackers. Leikessa feels strongly that the system should be more secure than it
would be if the least secure option is selected.
Ms. Jones has tried to explain the risks to ToyTimeInc, but the CEO, the CIO, and the Director of Personnel are all
convinced that the cheapest security is what they want.
Should Jones refuse to build the system with the least secure option?
Case Study 2: Relevant Clauses
• Principle 1. PUBLIC Software engineers shall act consistently with the
public interest. In particular, software engineers shall, as appropriate:
• 1.01. Accept full responsibility for their own work.
• 1.03. Approve software only if they have a well-founded belief that it is
safe, meets specifications, passes appropriate tests, and does not
diminish quality of life, diminish privacy or harm the environment.
The ultimate effect of the work should be to the public good.
Case Study 2: Relevant Clauses
• Principle 2. CLIENT AND EMPLOYER Software engineers shall
act in a manner that is in the best interests of their client and
employer, consistent with the public interest. In particular, software
engineers shall, as appropriate:
• 2.05. Keep private any confidential information gained in their professional
work, where such confidentiality is consistent with the public interest and
consistent with the law.
Case Study 2: Relevant Clauses
• Principle 3. PRODUCT Software engineers shall ensure that their
products and related modifications meet the highest professional
standards possible. In particular, software engineers shall, as appropriate:
• 3.01. Strive for high quality, acceptable cost, and a reasonable
schedule, ensuring significant trade offs are clear to and accepted by
the employer and the client, and are available for consideration by the
user and the public.
• 3.03. Identify, define and address ethical, economic, cultural, legal
and environmental issues related to work projects.
• 3.12. Work to develop software and related documents that respect
the privacy of those who will be affected by that software.
Applying the Code
• Privacy
• Security of private data vs. economic interests of the client
• Mistake: offering an option that is not beneficial to the public
• Ms. Jones cannot just blame the client
• Ms. Jones failed in her duty to use sound professional judgement
• She may need to absorb the additional cost of a sufficiently
secure solution as a loss
Case Study 3
Juan Rodriguez is a private consultant who advises small businesses about their computer needs.
Juan examines a company's operations, evaluates their automation needs, and recommends
hardware and software to meet those needs.
Recently, Juan was hired by a small, private hospital interested in upgrading their system for patient
records and accounting. The hospital had already solicited proposals for upgrading the system, and
hired Juan to evaluate the proposals they'd received.
Juan carefully examined the proposals on the basis of the systems proposed, the experience of the
companies that bid, and the costs and benefits of each proposal. He concluded that Tri-Star Systems
had proposed the best system for the hospital, and he recommended that the hospital should buy the
Tri-Star system. He included a detailed explanation for why he thought the Tri-Star bid was the best.
Juan did not reveal to the hospital that he is a silent partner (a co-owner) in Tri-Star Systems.
Was Juan's behavior unethical? We will assume for our discussion that Juan
evaluated the bids in good faith, and sincerely believed that Tri-Star had given the best bid.
Case Study 3: Relevant Clauses
• Principle 4. JUDGMENT Software engineers shall maintain
integrity and independence in their professional judgment.
In particular, software engineers shall, as appropriate:
• 4.05. Disclose to all concerned parties those conflicts of
interest that cannot reasonably be avoided or escaped.
Applying the Code
• This is an easy case:
• [C]lause 4.05 clearly labels Mr. Rodriguez's actions as wrong.
Mr. Rodriguez did not fulfill his professional obligations when he neglected
to disclose his conflict of interest to the hospital. Notice that his sincerity
about the superiority of the Tri-Star bid is not a central issue here.
The central issue is the trust Tri-Star has invested in Juan. If Mr. Rodriguez
had disclosed his part ownership in Tri-Star to the hospital, and the hospital
had still hired him to evaluate the bids, then Juan could have attempted to
do a professional job of evaluation. (Some people might find that difficult,
but it is at least theoretically possible.) However, the Code clearly prohibits
Juan from taking this job without first giving the hospital the opportunity to
judge for itself whether or not they wanted to hire Mr. Rodriguez despite
his interest in Tri-Star.
Reference
• http://www.acm.org/about/code-of-ethics
• http://www.acm.org/about/se-code
• http://www.acm.org/about/se-code
• http://portal.acm.org/citation.cfm?id=1040168#
• R.E.Anderson, D.G. Johnson, D. Gotterbarn, and J. Perrolle,
• “Using the NewACM Code of Ethics in Decision Making,” Comm.
• ACM, vol. 36, no. 2, pp. 98-107, 1993.
• [6]Archaeological Institute of America, “Code of Professional
• Standards,”http://www.archa e o l o g i c a l .org/pdfs/
• AIA_Code_of_Professional_StandardsA5S.pdf.
• [7] U. Becker-Kornstaedt, “Descriptive Software Process Modeling—
• How to Deal with Sensitive Process Information,” Empirical
• Software Eng., vol. 6, no. 4, 2001.
• [8] Canadian Association of UniversityTeachers (CAUT), “CAUT
• Responds toTri-Council Code,” CAUT Bull., Nov. 1997, see also
• http://www.caut.ca/english/bulletin/97_oct/tricouncil.htm.

More Related Content

What's hot

Careers in ICT
Careers in ICTCareers in ICT
Careers in ICTOtto Akama
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw houseHamza Cheema
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethicsEyelean xilef
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computingHamza Cheema
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT UsersMark Jhon Oxillo
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethicsMuhammad Haroon
 
01 computing
01 computing01 computing
01 computingSulman Ahmed
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice Saqib Raza
 
IEEE Code Of Conduct/Ethics
IEEE Code Of Conduct/EthicsIEEE Code Of Conduct/Ethics
IEEE Code Of Conduct/EthicsMuhammad Amjad Rana
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skillsHamza Cheema
 
Organizational financial practices in Professional Practices of IT
Organizational financial practices in Professional Practices of ITOrganizational financial practices in Professional Practices of IT
Organizational financial practices in Professional Practices of ITMuhammad Shakir Khan
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4Kashif Sohail
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

What's hot (20)

software engineering ethics
software engineering ethicssoftware engineering ethics
software engineering ethics
 
Careers in ICT
Careers in ICTCareers in ICT
Careers in ICT
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computing
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT Users
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
01 computing
01 computing01 computing
01 computing
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
IEEE Code Of Conduct/Ethics
IEEE Code Of Conduct/EthicsIEEE Code Of Conduct/Ethics
IEEE Code Of Conduct/Ethics
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
 
Organizational financial practices in Professional Practices of IT
Organizational financial practices in Professional Practices of ITOrganizational financial practices in Professional Practices of IT
Organizational financial practices in Professional Practices of IT
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Similar to professional Issues in COmputer science and Engineering

Lecture4EngSocExp.ppt (1).pdf
Lecture4EngSocExp.ppt (1).pdfLecture4EngSocExp.ppt (1).pdf
Lecture4EngSocExp.ppt (1).pdfMCarmelSobia
 
Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxbahmed0192
 
Super billing computers, ethics, social values
Super billing computers, ethics, social valuesSuper billing computers, ethics, social values
Super billing computers, ethics, social valuessuperb11b
 
Ece481 lecture4engsocexp
Ece481 lecture4engsocexpEce481 lecture4engsocexp
Ece481 lecture4engsocexpVelmathi Saravanan
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxSANSKAR20
 
Fundamentals_of_testing.pdf
Fundamentals_of_testing.pdfFundamentals_of_testing.pdf
Fundamentals_of_testing.pdfAndreeaDavid22
 
BackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxBackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxwilcockiris
 
BackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxBackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxjasoninnes20
 
Ethics in EngineeringLecture #2 Ethical Dilemmas, Cho
Ethics in EngineeringLecture #2 Ethical Dilemmas, ChoEthics in EngineeringLecture #2 Ethical Dilemmas, Cho
Ethics in EngineeringLecture #2 Ethical Dilemmas, ChoBetseyCalderon89
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidSteve Branam
 
201810003 201750007project report
201810003 201750007project report201810003 201750007project report
201810003 201750007project reportssuser219889
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.pptClaudeDex
 
professional ethics
professional ethicsprofessional ethics
professional ethicsHamza Cheema
 
You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems walthamcoretta
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsIMAD HASSAN
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guideaqazad
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
week 2 lec 3 PP.pptx
week 2 lec 3 PP.pptxweek 2 lec 3 PP.pptx
week 2 lec 3 PP.pptxkhazinanaveed890
 

Similar to professional Issues in COmputer science and Engineering (20)

Lecture4EngSocExp.ppt (1).pdf
Lecture4EngSocExp.ppt (1).pdfLecture4EngSocExp.ppt (1).pdf
Lecture4EngSocExp.ppt (1).pdf
 
Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptx
 
Super billing computers, ethics, social values
Super billing computers, ethics, social valuesSuper billing computers, ethics, social values
Super billing computers, ethics, social values
 
Ece481 lecture4engsocexp
Ece481 lecture4engsocexpEce481 lecture4engsocexp
Ece481 lecture4engsocexp
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
 
Fundamentals_of_testing.pdf
Fundamentals_of_testing.pdfFundamentals_of_testing.pdf
Fundamentals_of_testing.pdf
 
BackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxBackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docx
 
BackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docxBackgroundEthical issues can sometimes be complex and require mo.docx
BackgroundEthical issues can sometimes be complex and require mo.docx
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testing
 
Ethics in EngineeringLecture #2 Ethical Dilemmas, Cho
Ethics in EngineeringLecture #2 Ethical Dilemmas, ChoEthics in EngineeringLecture #2 Ethical Dilemmas, Cho
Ethics in EngineeringLecture #2 Ethical Dilemmas, Cho
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
201810003 201750007project report
201810003 201750007project report201810003 201750007project report
201810003 201750007project report
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
week 2 lec 3 PP.pptx
week 2 lec 3 PP.pptxweek 2 lec 3 PP.pptx
week 2 lec 3 PP.pptx
 

More from Mohibullah Saail

Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interfaceMohibullah Saail
 
Applications security and Artificial Intelligence
Applications security and Artificial Intelligence Applications security and Artificial Intelligence
Applications security and Artificial Intelligence Mohibullah Saail
 
Database Security Login
Database Security LoginDatabase Security Login
Database Security LoginMohibullah Saail
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementationMohibullah Saail
 
Secure hash function
Secure hash functionSecure hash function
Secure hash functionMohibullah Saail
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its ComponentsMohibullah Saail
 
Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptographyMohibullah Saail
 

More from Mohibullah Saail (9)

Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Applications security and Artificial Intelligence
Applications security and Artificial Intelligence Applications security and Artificial Intelligence
Applications security and Artificial Intelligence
 
Access control
Access controlAccess control
Access control
 
Database Security Login
Database Security LoginDatabase Security Login
Database Security Login
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
Secure hash function
Secure hash functionSecure hash function
Secure hash function
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
 
Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptography
 
Security login
Security loginSecurity login
Security login
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

professional Issues in COmputer science and Engineering

  • 1. Professional Issues in Computer Science and Engineering Three Case Studies for the ACM/IEEE-CS Software Engineering Codes of Ethics Name : Sami Ullah & Name : Mohib Ullah Sail
  • 2. Three Codes of Ethics • ACM Codes of Ethics and Professional Conduct: http://www.acm.org/about/code-of-ethics • ACM/IEEE-CS Software Engineering Code of Ethics and Professional Practice http://www.acm.org/about/se-code • The Ten Commandments of Computer Ethics http://www.acm.org/about/se-code • Three case studies: Gotterbarn, D. and Miller, K. W. 2004. Computer ethics in the undergraduate curriculum: case studies and the joint software engineer's code. J. Comput. Small Coll. 20, 2 (Dec. 2004), 156- 167, http://portal.acm.org/citation.cfm?id=1040168#
  • 3. Principles of the SE Code 1 PUBLIC - Software engineers shall act consistently with the public interest. 2 CLIENT AND EMPLOYER - Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest. 3 PRODUCT - Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 4 JUDGMENT - Software engineers shall maintain integrity and independence in their professional judgment. 5 MANAGEMENT - Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. 6 PROFESSION - Software engineers shall advance the integrity and reputation of the profession consistent with the public interest. 7 COLLEAGUES - Software engineers shall be fair to and supportive of their colleagues. 8 SELF - Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.
  • 4. Case Study 1 George Babbage is an experienced software developer working for Acme Software Company. Mr. Babbage is now working on a project for the U.S. Department of Defense, testing the software used in controlling an experimental jet fighter. George is the quality control manager for the software. Early simulation testing revealed that, under certain conditions, instabilities would arise that could cause the plane to crash. The software was patched to eliminate the specific problems uncovered by the tests. After these repairs, the software passed all the simulation tests. George is not convinced that the software is safe. He is worried that the problems uncovered by the simulation testing were symptomatic of a design flaw that could only be eliminated by an extensive redesign of the software. He is convinced that the patch that was applied to remedy the specific tests in the simulation did not address the underlying problem. But, when George brings his concerns to his superiors, they assure him that the problem has been resolved. They further inform George that any major redesign effort would introduce unacceptable delays, resulting in costly penalties to the company. There is a great deal of pressure on George to sign off on the system and to allow it to be flight tested. It has even been hinted that, if he persists in delaying the system, he will be fired. What should George do next?
  • 5. Case Study 1: Relevant Clauses • Principle 1. PUBLIC Software engineers shall act consistently with the public interest. In particular, software engineers shall, as appropriate: • 1.03. Approve software only if they have a well-founded belief that it is safe, meets specifications, passes appropriate tests, and does not diminish quality of life, diminish privacy or harm the environment. The ultimate effect of the work should be to the public good. • 1.04. Disclose to appropriate persons or authorities any actual or potential danger to the user, the public, or the environment, that they reasonably believe to be associated with software or related documents.
  • 6. Case Study 1: Relevant Clauses • Principle 3. PRODUCT Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. In particular, software engineers shall, as appropriate: • 3.10. Ensure adequate testing, debugging, and review of software and related documents on which they work.
  • 7. Case Study 1: Relevant Clauses • Principle 5. MANAGEMENT Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. In particular, those managing or leading software engineers shall, as appropriate: • 5.01 Ensure good management for any project on which they work, including effective procedures for promotion of quality and reduction of risk. • 5.11. Not ask a software engineer to do anything inconsistent with this Code.
  • 8. Applying the Code • Whose safety? • How safe? • Safe enough! Professional judgement • Management’s position • “The standard supported by the Code is to have the burden to demonstrate that the software is safe before deployment instead of having to prove it unsafe before deployment is halted.”
  • 9. Case Study 2 Leikessa Jones owns her own consulting business, and has several people working for her. Leikessa is currently designing a database management system for the personnel office of ToyTimeInc., a mid-sized company that makes toys. Leikessa has involved ToyTimeInc management in the design process from the start of the project. It is now time to decide about the kind and degree of security to build into the system. Leikessa has described several options to the client. The client has decided to opt for the least secure system because the system is going to cost more than was initially planned, and the least secure option is the cheapest security option. Leikessa knows that the database includes sensitive information, such as performance evaluations, medical records, and salaries. With weak security, she fears that enterprising ToyTimeInc employees will be able to easily access this sensitive data. Furthermore, she fears that the system will be an easy target for external hackers. Leikessa feels strongly that the system should be more secure than it would be if the least secure option is selected. Ms. Jones has tried to explain the risks to ToyTimeInc, but the CEO, the CIO, and the Director of Personnel are all convinced that the cheapest security is what they want. Should Jones refuse to build the system with the least secure option?
  • 10. Case Study 2: Relevant Clauses • Principle 1. PUBLIC Software engineers shall act consistently with the public interest. In particular, software engineers shall, as appropriate: • 1.01. Accept full responsibility for their own work. • 1.03. Approve software only if they have a well-founded belief that it is safe, meets specifications, passes appropriate tests, and does not diminish quality of life, diminish privacy or harm the environment. The ultimate effect of the work should be to the public good.
  • 11. Case Study 2: Relevant Clauses • Principle 2. CLIENT AND EMPLOYER Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest. In particular, software engineers shall, as appropriate: • 2.05. Keep private any confidential information gained in their professional work, where such confidentiality is consistent with the public interest and consistent with the law.
  • 12. Case Study 2: Relevant Clauses • Principle 3. PRODUCT Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. In particular, software engineers shall, as appropriate: • 3.01. Strive for high quality, acceptable cost, and a reasonable schedule, ensuring significant trade offs are clear to and accepted by the employer and the client, and are available for consideration by the user and the public. • 3.03. Identify, define and address ethical, economic, cultural, legal and environmental issues related to work projects. • 3.12. Work to develop software and related documents that respect the privacy of those who will be affected by that software.
  • 13. Applying the Code • Privacy • Security of private data vs. economic interests of the client • Mistake: offering an option that is not beneficial to the public • Ms. Jones cannot just blame the client • Ms. Jones failed in her duty to use sound professional judgement • She may need to absorb the additional cost of a sufficiently secure solution as a loss
  • 14. Case Study 3 Juan Rodriguez is a private consultant who advises small businesses about their computer needs. Juan examines a company's operations, evaluates their automation needs, and recommends hardware and software to meet those needs. Recently, Juan was hired by a small, private hospital interested in upgrading their system for patient records and accounting. The hospital had already solicited proposals for upgrading the system, and hired Juan to evaluate the proposals they'd received. Juan carefully examined the proposals on the basis of the systems proposed, the experience of the companies that bid, and the costs and benefits of each proposal. He concluded that Tri-Star Systems had proposed the best system for the hospital, and he recommended that the hospital should buy the Tri-Star system. He included a detailed explanation for why he thought the Tri-Star bid was the best. Juan did not reveal to the hospital that he is a silent partner (a co-owner) in Tri-Star Systems. Was Juan's behavior unethical? We will assume for our discussion that Juan evaluated the bids in good faith, and sincerely believed that Tri-Star had given the best bid.
  • 15. Case Study 3: Relevant Clauses • Principle 4. JUDGMENT Software engineers shall maintain integrity and independence in their professional judgment. In particular, software engineers shall, as appropriate: • 4.05. Disclose to all concerned parties those conflicts of interest that cannot reasonably be avoided or escaped.
  • 16. Applying the Code • This is an easy case: • [C]lause 4.05 clearly labels Mr. Rodriguez's actions as wrong. Mr. Rodriguez did not fulfill his professional obligations when he neglected to disclose his conflict of interest to the hospital. Notice that his sincerity about the superiority of the Tri-Star bid is not a central issue here. The central issue is the trust Tri-Star has invested in Juan. If Mr. Rodriguez had disclosed his part ownership in Tri-Star to the hospital, and the hospital had still hired him to evaluate the bids, then Juan could have attempted to do a professional job of evaluation. (Some people might find that difficult, but it is at least theoretically possible.) However, the Code clearly prohibits Juan from taking this job without first giving the hospital the opportunity to judge for itself whether or not they wanted to hire Mr. Rodriguez despite his interest in Tri-Star.
  • 17. Reference • http://www.acm.org/about/code-of-ethics • http://www.acm.org/about/se-code • http://www.acm.org/about/se-code • http://portal.acm.org/citation.cfm?id=1040168# • R.E.Anderson, D.G. Johnson, D. Gotterbarn, and J. Perrolle, • “Using the NewACM Code of Ethics in Decision Making,” Comm. • ACM, vol. 36, no. 2, pp. 98-107, 1993. • [6]Archaeological Institute of America, “Code of Professional • Standards,”http://www.archa e o l o g i c a l .org/pdfs/ • AIA_Code_of_Professional_StandardsA5S.pdf. • [7] U. Becker-Kornstaedt, “Descriptive Software Process Modeling— • How to Deal with Sensitive Process Information,” Empirical • Software Eng., vol. 6, no. 4, 2001. • [8] Canadian Association of UniversityTeachers (CAUT), “CAUT • Responds toTri-Council Code,” CAUT Bull., Nov. 1997, see also • http://www.caut.ca/english/bulletin/97_oct/tricouncil.htm.