SlideShare a Scribd company logo
1 of 19
PROFESSIONAL
ETHICS & CODES
OF CONDUCT
Lecture 3
LAST LECTURE
Professionalism Traits of a
Professional
IEEE Code of
Ethics
MOTIVATION
FOR “CODE
OF ETHICS”
Historical
professional associations use mechanism to
establish status as a profession
regulate their membership
convince public that associate deserves to be self-
regulated
Self-regulation: one solution
apply code of ethics
ethics review board
deter unethical behavior of members
CODE OF
ETHICS
 Lists possible violations(acts against something).
 Threaten sanctions(approve of something)( for such
violations
 Association of Computing Machinery (ACM)
 One of the two most important professional
associations for computer scientists / IT professionals
 1972: Code of Professional conduct
 1992: Code of Ethics and Professional Conduct
 Difficulties implementing ethics review system
 1972’s goal was “carrots and sticks”
 1992’s goal: major shift towards socialization and
education
 Clarifies professionals’ responsibility to society
MOST
IMPORTANT
GOAL
 Provides an aid to individual decision making
 Presentation addresses nine different cases (with some
overlap)
 intellectual property
 privacy
 confidentiality
 professional quality
 fairness or discrimination
 liability
 software risks
 conflicts of interest
 unauthorized access to computer systems
ACM CODE OF
ETHICS (1)
 General moral imperatives: “As an ACM member I
will…”
1. Contribute to society and human well-being.
2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honour property rights including
copyrights and patents.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honour confidentiality.
ACM CODE OF
ETHICS (2)
 Specific professional responsibilities: “As an ACM computing
professional I will”:
1. Attempt to achieve the highest quality, effectiveness and
dignity in both the process and products of professional
work.
2. Acquire and maintain professional competence.
3. Know and respect existing laws pertaining to professional
work.
4. Accept and provide appropriate professional review.
5. Give comprehensive and detailed evaluations of computer
system and their impacts, including analysis of possible risks.
6. Honour contracts, agreements, and assigned responsibilities.
7. Improve public understanding of computing and its
consequences.
8. Access computing and communication resources only when
authorized to do so.
ACM CODE OF
ETHICS (3)
 Organization leadership imperatives: “As an ACM member and an
organizational leader, I will:”
1. Articulate(clear) social responsibilities of members of an organizational
unit and encourage full acceptance of those responsibilities.
2. Manage personnel and resources to design and build information
systems that enhance the quality of working life.
3. Acknowledge and support proper and authorized uses of an
organization’s computing and communication resources.
4. Ensure that users and those who will be affected by a design have
their needs clearly articulated during the assessment and design of
requirements; later the system must be validated to meet requirements.
5. Articulate and support policies that protect the dignity of users and
others affected by a computing system.
6. Create opportunities for members of the organization to learn the
principles and limitations of computer systems.
ACM CODE OF
ETHICS (4)
• Compliance with the Code: “As an ACM
member, I will:”
1. Uphold and promote the principles of this
Code.
2. Treat violations of this code as
inconsistent with membership in the ACM.
ETHICAL DECISION MAKING: CASE 1
 Ali is a database programmer
 large statistical program needed by his company
 company programmers are encouraged to publicize their work
 Ali has found himself stuck on a problem
 Has continued at this for several months.
 His manager does not recognize complexity of problem.
 She insists job be completed in the few days.
 Ali remembers:
 co-worker had given him source listings of their current work
 he also has an early version of commercial software developed at another company
ETHICAL DECISION MAKING: CASE 1
 Ali studies these programs
 Sees two areas of code which could be directly incorporated into his own program
 He uses segments of code both from his coworker and from the commercial software
 He does not tell anyone or mention it in the documentation.
 He completes the project and turns it in a day ahead of time.
 How does the Code of Ethics help us understand this case?
APPLYING THE CODE: CASE 1
 This case highlights issues involving intellectual property
 1.6: “Give proper credit for intellectual property”
 Specifically, do not take credit for other’s ideas or work.
 Property rights principle (1.5)
 copyrights, patents, trade secrets, license agreements
 Restrictions also ground in:
 integrity (1.3)
 fulfill existing laws (2.3)
APPLYING THE
CODE: CASE 1
• Failure to give credit for another’s work.
• Using code from a commercial package that was copyrighted.
Ali violated professional ethics in two areas:
• Could he then write his own program and still have an
commitment to give credit?
If Ali only “looked” at co-worker’s source code:
• He should have acknowledged credit in documentation.
• (Some professional discretion possible here, especially if
intellectual material is minor.)
Yes:
APPLYING THE CODE: CASE 1
• Use of commercial software code was also not appropriate:
• Ali should have checked to determine whether or not company was authorized to
use source code before using it.
• In general:
• Desirable to share and exchange intellectual materials
• But using bootlegged software is definitely a violation of code.
ETHICAL DECISION MAKING: CASE 2
 Three years ago, Aisha started her own consulting business
 She is so successful she now has several people working for her.
 Has many clients.
 Includes work such as advising on network architectures, designing DBMSes, security.
 Presently designing a DBMS for the personnel office, a medium-sized (100 person) company.
 Aisha has involved client in design process
 Informs CEO, CTO and human resources head about system progress
ETHICAL DECISION MAKING: CASE 2
 Now it is time to make decisions about the kind and degree of security to build into system.
 Aisha has described several options.
 Because of cost overruns, client has decided to opt for a less secure system.
 Aisha believes information they will store is extremely sensitive (performance evaluations, medical records for insurance claims, salaries,
etc.)
 With weak security:
 Employees on workstations could figure out how to access this data.
 Online intruders would also have access
ETHICAL
DECISION
MAKING: CASE 2
• Aisha feels strongly that system should be
much more secure.
• She has tried to explain the risk.
• CEO, CTO and HR all agree that less security
will do.
• What should Aisha so?
• Should she refuse to build the system as they
request?
APPLYING THE CODE: CASE 2
• Principle 1.7 deals with privacy
• Principle 1.8 deals with confidentiality
This case highlights issues involving privacy
• “computer professionals are obligated to preserve the integrity of
data about individuals…”
• “… from unauthorized access or accidental disclosure to
inappropriate individuals”
Code guidelines state that:
• Principle 3.5 (enhance personal dignity)
• Principle 3.4 (assess needs of all those affected by system)
Code also specifies for organizational leaders:
APPLYING THE CODE: CASE 2
 Company officials:
 Have an obligation to protect privacy of their employees.
 Therefore they should not accept inadequate security.
 Aisha’s first obligation:
 Attempt to educate company officials (implied by principle 2.7)
 If that fails, she needs to consider her contractual obligations (principle 2.6) in honoring assigned responsibilities.
 We don’t have Aisha’s contract, but she may have to choose between her contract and her obligation to honour privacy and security.

More Related Content

Similar to Professional practices week 2 lec 2.pptx

professional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineeringprofessional Issues in COmputer science and Engineering
professional Issues in COmputer science and EngineeringMohibullah Saail
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptxMohammedAish
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docxalinainglis
 
Ethics and software engineering
Ethics and software engineeringEthics and software engineering
Ethics and software engineeringSolomon Nsumba
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethicfauzihayob
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsIMAD HASSAN
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
1. Emergence of Software EngineeringIn the software industry, we.docx
1. Emergence of Software EngineeringIn the software industry, we.docx1. Emergence of Software EngineeringIn the software industry, we.docx
1. Emergence of Software EngineeringIn the software industry, we.docxjackiewalcutt
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notesedwinlorenzana
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 

Similar to Professional practices week 2 lec 2.pptx (20)

professional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineeringprofessional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineering
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
 
Ethics and software engineering
Ethics and software engineeringEthics and software engineering
Ethics and software engineering
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethic
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
1. Emergence of Software EngineeringIn the software industry, we.docx
1. Emergence of Software EngineeringIn the software industry, we.docx1. Emergence of Software EngineeringIn the software industry, we.docx
1. Emergence of Software EngineeringIn the software industry, we.docx
 
SIP report.pptx
SIP report.pptxSIP report.pptx
SIP report.pptx
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 

Recently uploaded

OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 

Recently uploaded (20)

OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 

Professional practices week 2 lec 2.pptx

  • 1. PROFESSIONAL ETHICS & CODES OF CONDUCT Lecture 3
  • 2. LAST LECTURE Professionalism Traits of a Professional IEEE Code of Ethics
  • 3. MOTIVATION FOR “CODE OF ETHICS” Historical professional associations use mechanism to establish status as a profession regulate their membership convince public that associate deserves to be self- regulated Self-regulation: one solution apply code of ethics ethics review board deter unethical behavior of members
  • 4. CODE OF ETHICS  Lists possible violations(acts against something).  Threaten sanctions(approve of something)( for such violations  Association of Computing Machinery (ACM)  One of the two most important professional associations for computer scientists / IT professionals  1972: Code of Professional conduct  1992: Code of Ethics and Professional Conduct  Difficulties implementing ethics review system  1972’s goal was “carrots and sticks”  1992’s goal: major shift towards socialization and education  Clarifies professionals’ responsibility to society
  • 5. MOST IMPORTANT GOAL  Provides an aid to individual decision making  Presentation addresses nine different cases (with some overlap)  intellectual property  privacy  confidentiality  professional quality  fairness or discrimination  liability  software risks  conflicts of interest  unauthorized access to computer systems
  • 6. ACM CODE OF ETHICS (1)  General moral imperatives: “As an ACM member I will…” 1. Contribute to society and human well-being. 2. Avoid harm to others. 3. Be honest and trustworthy. 4. Be fair and take action not to discriminate. 5. Honour property rights including copyrights and patents. 6. Give proper credit for intellectual property. 7. Respect the privacy of others. 8. Honour confidentiality.
  • 7. ACM CODE OF ETHICS (2)  Specific professional responsibilities: “As an ACM computing professional I will”: 1. Attempt to achieve the highest quality, effectiveness and dignity in both the process and products of professional work. 2. Acquire and maintain professional competence. 3. Know and respect existing laws pertaining to professional work. 4. Accept and provide appropriate professional review. 5. Give comprehensive and detailed evaluations of computer system and their impacts, including analysis of possible risks. 6. Honour contracts, agreements, and assigned responsibilities. 7. Improve public understanding of computing and its consequences. 8. Access computing and communication resources only when authorized to do so.
  • 8. ACM CODE OF ETHICS (3)  Organization leadership imperatives: “As an ACM member and an organizational leader, I will:” 1. Articulate(clear) social responsibilities of members of an organizational unit and encourage full acceptance of those responsibilities. 2. Manage personnel and resources to design and build information systems that enhance the quality of working life. 3. Acknowledge and support proper and authorized uses of an organization’s computing and communication resources. 4. Ensure that users and those who will be affected by a design have their needs clearly articulated during the assessment and design of requirements; later the system must be validated to meet requirements. 5. Articulate and support policies that protect the dignity of users and others affected by a computing system. 6. Create opportunities for members of the organization to learn the principles and limitations of computer systems.
  • 9. ACM CODE OF ETHICS (4) • Compliance with the Code: “As an ACM member, I will:” 1. Uphold and promote the principles of this Code. 2. Treat violations of this code as inconsistent with membership in the ACM.
  • 10. ETHICAL DECISION MAKING: CASE 1  Ali is a database programmer  large statistical program needed by his company  company programmers are encouraged to publicize their work  Ali has found himself stuck on a problem  Has continued at this for several months.  His manager does not recognize complexity of problem.  She insists job be completed in the few days.  Ali remembers:  co-worker had given him source listings of their current work  he also has an early version of commercial software developed at another company
  • 11. ETHICAL DECISION MAKING: CASE 1  Ali studies these programs  Sees two areas of code which could be directly incorporated into his own program  He uses segments of code both from his coworker and from the commercial software  He does not tell anyone or mention it in the documentation.  He completes the project and turns it in a day ahead of time.  How does the Code of Ethics help us understand this case?
  • 12. APPLYING THE CODE: CASE 1  This case highlights issues involving intellectual property  1.6: “Give proper credit for intellectual property”  Specifically, do not take credit for other’s ideas or work.  Property rights principle (1.5)  copyrights, patents, trade secrets, license agreements  Restrictions also ground in:  integrity (1.3)  fulfill existing laws (2.3)
  • 13. APPLYING THE CODE: CASE 1 • Failure to give credit for another’s work. • Using code from a commercial package that was copyrighted. Ali violated professional ethics in two areas: • Could he then write his own program and still have an commitment to give credit? If Ali only “looked” at co-worker’s source code: • He should have acknowledged credit in documentation. • (Some professional discretion possible here, especially if intellectual material is minor.) Yes:
  • 14. APPLYING THE CODE: CASE 1 • Use of commercial software code was also not appropriate: • Ali should have checked to determine whether or not company was authorized to use source code before using it. • In general: • Desirable to share and exchange intellectual materials • But using bootlegged software is definitely a violation of code.
  • 15. ETHICAL DECISION MAKING: CASE 2  Three years ago, Aisha started her own consulting business  She is so successful she now has several people working for her.  Has many clients.  Includes work such as advising on network architectures, designing DBMSes, security.  Presently designing a DBMS for the personnel office, a medium-sized (100 person) company.  Aisha has involved client in design process  Informs CEO, CTO and human resources head about system progress
  • 16. ETHICAL DECISION MAKING: CASE 2  Now it is time to make decisions about the kind and degree of security to build into system.  Aisha has described several options.  Because of cost overruns, client has decided to opt for a less secure system.  Aisha believes information they will store is extremely sensitive (performance evaluations, medical records for insurance claims, salaries, etc.)  With weak security:  Employees on workstations could figure out how to access this data.  Online intruders would also have access
  • 17. ETHICAL DECISION MAKING: CASE 2 • Aisha feels strongly that system should be much more secure. • She has tried to explain the risk. • CEO, CTO and HR all agree that less security will do. • What should Aisha so? • Should she refuse to build the system as they request?
  • 18. APPLYING THE CODE: CASE 2 • Principle 1.7 deals with privacy • Principle 1.8 deals with confidentiality This case highlights issues involving privacy • “computer professionals are obligated to preserve the integrity of data about individuals…” • “… from unauthorized access or accidental disclosure to inappropriate individuals” Code guidelines state that: • Principle 3.5 (enhance personal dignity) • Principle 3.4 (assess needs of all those affected by system) Code also specifies for organizational leaders:
  • 19. APPLYING THE CODE: CASE 2  Company officials:  Have an obligation to protect privacy of their employees.  Therefore they should not accept inadequate security.  Aisha’s first obligation:  Attempt to educate company officials (implied by principle 2.7)  If that fails, she needs to consider her contractual obligations (principle 2.6) in honoring assigned responsibilities.  We don’t have Aisha’s contract, but she may have to choose between her contract and her obligation to honour privacy and security.