he basic rights of engineers include the right to live freely and pursue their legitimate interests as any human being, along with the right to be against racial or sexual discrimination, receiving one's salary according to the work, choosing of political activities, etc., as other employees.
Unit-4 Professional Ethics in EngineeringNandakumar P
About an engineer's responsibility and rights he/she having nowadays. This PPT will give them a basic approach towards engineer's work towards public needs that develop the society in this updated world.
Unit-4 Professional Ethics in EngineeringNandakumar P
About an engineer's responsibility and rights he/she having nowadays. This PPT will give them a basic approach towards engineer's work towards public needs that develop the society in this updated world.
This video is about team work and rights of professional working in different organizations. Topics like ethical corporate climate, loyalty and collegiality, respect for authority, professional rights, employee rights: sexual harassment, non discrimination, affirmative actions, privacy rights, right to equal opportunity etc are discussed
Social Media in the Workplace
Linky Trott
Abstract
There is no doubt that most businesses use social media and collaboration tools
such as social business software of some kind or another and embrace the
benefits that these can bring. In a 2009 a global Manpower survey, businesses
identified the main benefits of using social media as; brand building, fostering
collaboration and communication, as way of recruiting new talent, improving
employee engagement and driving innovation.
But there are also risks. This article examines the main legal risks that can arise
in the workplace as between a business and its workforce and considers how
the Courts and Tribunals are responding to social media issues arising in the
workplace.
Introduction
If a business has a concern about the use of social media, a blanket ban is
clearly an option. Whilst that may feel like the most simple approach, it is
unlikely to be practical. Even as far back as 2009, the Manpower survey
observed that “the younger generation consider social media tools as a
Biography
Linky Trott is a Partner at law firm, Edwin Coe. She provides day to day advice on a
comprehensive range of employment issues for established corporate clients including
the negotiation and provision of strategic advice on severance arrangements, bullying
and harassment claims, the management of ill health and capability dismissals, dealing
with allegations of discrimination, collective redundancies and Board disputes.
Linky also undertakes High Court injunctive work to enforce or resist post termination
restraints and the protection of confidential information. Working with Senior
Executives and Board Directors, Linky regularly advises and helps to negotiate terms
of Executive service agreements to include bonus schemes, guaranteed payments and
share options in regulated and non regulated industries. She has provided strategic
advice on a number of successful team moves within the communications and financial
sector acting for both the poaching competitor and the individuals being approached.
Linky also advises on data protection, commercial agents and the Conduct of
Employment Businesses and Employment Agency issues.
Linky sits on the Employment Committee of the Law Society and is Chair on the In and
Around Covent Garden Business Forum. She is also a member of the Employment
Lawyers Association, and has appeared on ITV and Channel 4 commenting on
Employment Law issues arising in the news and is a regular speaker at conferences on
employment issues.
Linky Trott
Partner
Edwin Coe
Keywords Risk, Rewards, Safeguards, Recruitment, Human Rights Act 1998
Paper type Opinion
23 Credit Control
Legal Aspects
prerequisite for doing business” and with generation Y having been in the
workplace for around ten years, it is unlikely that staff will tolerate a blanket ban.
Time wasters
Employers can of course monitor an employe.
January 2011 - Business Law & Order - Mark HeuselAnnArborSPARK
Hiring practices; Employees vs Independent Contractors; Wage & Hour Issues; Discrimination Issues; Whistleblower protection; Best practices
Mark Heusel is a Member of Dickinson Wright, PLLC’s Ann Arbor office. Dickinson Wright is a international law firm with offices in Michigan, Washington D.C., Nashville, Phoenix, Las Vegas and Toronto. Mr. Heusel works with companies in a variety of circumstances in the commercial litigation and employment law areas. He has substantial experience in advising clients on a host of employment related issues, including litigation avoidance, human resource issues, discrimination and wrongful termination litigation, non-compete and trade secret matters, and business practices. He is also a frequent lecturer and author on these issues and when necessary, a vigorous litigator.
The Internet of Things (IoT) is a revolutionary concept that connects everyday objects and devices to the internet, enabling them to communicate, collect, and exchange data. Imagine a world where your refrigerator notifies you when you’re running low on groceries, or streetlights adjust their brightness based on traffic patterns – that’s the power of IoT. In essence, IoT transforms ordinary objects into smart, interconnected devices, creating a network of endless possibilities.
Here is a blog on the role of electrical and electronics engineers in IOT. Let's dig in!!!!
For more such content visit: https://nttftrg.com/
This video is about team work and rights of professional working in different organizations. Topics like ethical corporate climate, loyalty and collegiality, respect for authority, professional rights, employee rights: sexual harassment, non discrimination, affirmative actions, privacy rights, right to equal opportunity etc are discussed
Social Media in the Workplace
Linky Trott
Abstract
There is no doubt that most businesses use social media and collaboration tools
such as social business software of some kind or another and embrace the
benefits that these can bring. In a 2009 a global Manpower survey, businesses
identified the main benefits of using social media as; brand building, fostering
collaboration and communication, as way of recruiting new talent, improving
employee engagement and driving innovation.
But there are also risks. This article examines the main legal risks that can arise
in the workplace as between a business and its workforce and considers how
the Courts and Tribunals are responding to social media issues arising in the
workplace.
Introduction
If a business has a concern about the use of social media, a blanket ban is
clearly an option. Whilst that may feel like the most simple approach, it is
unlikely to be practical. Even as far back as 2009, the Manpower survey
observed that “the younger generation consider social media tools as a
Biography
Linky Trott is a Partner at law firm, Edwin Coe. She provides day to day advice on a
comprehensive range of employment issues for established corporate clients including
the negotiation and provision of strategic advice on severance arrangements, bullying
and harassment claims, the management of ill health and capability dismissals, dealing
with allegations of discrimination, collective redundancies and Board disputes.
Linky also undertakes High Court injunctive work to enforce or resist post termination
restraints and the protection of confidential information. Working with Senior
Executives and Board Directors, Linky regularly advises and helps to negotiate terms
of Executive service agreements to include bonus schemes, guaranteed payments and
share options in regulated and non regulated industries. She has provided strategic
advice on a number of successful team moves within the communications and financial
sector acting for both the poaching competitor and the individuals being approached.
Linky also advises on data protection, commercial agents and the Conduct of
Employment Businesses and Employment Agency issues.
Linky sits on the Employment Committee of the Law Society and is Chair on the In and
Around Covent Garden Business Forum. She is also a member of the Employment
Lawyers Association, and has appeared on ITV and Channel 4 commenting on
Employment Law issues arising in the news and is a regular speaker at conferences on
employment issues.
Linky Trott
Partner
Edwin Coe
Keywords Risk, Rewards, Safeguards, Recruitment, Human Rights Act 1998
Paper type Opinion
23 Credit Control
Legal Aspects
prerequisite for doing business” and with generation Y having been in the
workplace for around ten years, it is unlikely that staff will tolerate a blanket ban.
Time wasters
Employers can of course monitor an employe.
January 2011 - Business Law & Order - Mark HeuselAnnArborSPARK
Hiring practices; Employees vs Independent Contractors; Wage & Hour Issues; Discrimination Issues; Whistleblower protection; Best practices
Mark Heusel is a Member of Dickinson Wright, PLLC’s Ann Arbor office. Dickinson Wright is a international law firm with offices in Michigan, Washington D.C., Nashville, Phoenix, Las Vegas and Toronto. Mr. Heusel works with companies in a variety of circumstances in the commercial litigation and employment law areas. He has substantial experience in advising clients on a host of employment related issues, including litigation avoidance, human resource issues, discrimination and wrongful termination litigation, non-compete and trade secret matters, and business practices. He is also a frequent lecturer and author on these issues and when necessary, a vigorous litigator.
The Internet of Things (IoT) is a revolutionary concept that connects everyday objects and devices to the internet, enabling them to communicate, collect, and exchange data. Imagine a world where your refrigerator notifies you when you’re running low on groceries, or streetlights adjust their brightness based on traffic patterns – that’s the power of IoT. In essence, IoT transforms ordinary objects into smart, interconnected devices, creating a network of endless possibilities.
Here is a blog on the role of electrical and electronics engineers in IOT. Let's dig in!!!!
For more such content visit: https://nttftrg.com/
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
2. RESPONSIBILITIES
In practice engineers’ Responsibilities include much
more than preventing and responding to accidents. In
fact, during professional career of an engineer there
are many responsibilities and rights.
Responsibilities include both
Internal – responsibilities to employers
External – responsibilities to the outside world
3. INTERNAL RESPONSIBILITIES of
ENGINEERS
In today’s competitive world, the success of any organization
relies on its team-play. Working effectively as an engineer for a
project requires the ethics of team-play. Team-play involves
virtues of:
1. Collegiality
2. Loyalty
3. Respect for authority and
4. Collective Bargaining.
4. COLLEGIALITY
Collegiality as “a kind of connectedness grounded in
respect for professional expertise and in a commitment
to the goals and values of he profession”.
It is the tendency to support and cooperate with the
colleagues.
Elements of collegiality
Respect to the ideas and work of others: This
results in support and cooperation with one’s
colleagues. One gets back the support and
cooperation in return, and this is mutually
beneficial .
Commitment to moral principles: Commitment is
towards moral decisions, actions, goals of the
organization and values of the profession.
5. Connectedness: It means the shared commitment and mutual
understanding. It ensures the absence of egoism and paves way for
progress for both.
Generally collegiality should be encouraged among engineers because
1. It is an influential value to promote the aims of professions.
Therefore it strengthens an engineer’s motivation to live up to
professional standards .
2. It is more valuable as many individuals jointly working for the
goodness of the public and society.
6. LOYALTY
It is the quality of being true and faithful in one’s
support.
It is more a function of attitudes, emotions and a
sense of identity.
It is more a function of attitudes, emotions and a
sense of identity.
Two senses of Loyalty
1. Agency loyalty
2. Identification loyalty
7. AGENCY LOYALTY
It is an obligation to fulfill his/her contractual duties to the
employer. The duties are specific actions one is assigned, and in
general cooperating with others in the organization.
It consists of several obligations to employers. But, for the
engineers, the paramount obligation is still “the safety, health, and
welfare of the public”.
IDENTIFICATION LOYALTY
In contrast to agency loyalty, identification loyalty is much
concerned with attitudes, emotions and a sense of personal identity
as it does with actions.
This is more a virtue than an obligation. It is all right when the
organization work for productivity or development of community.
Working together in falsification of records or serious harm to the
public, does not merit loyalty
8. RESPECT FOR AUTHORITY
Authority can be defined as the legal right to command
action by others and to enforce compliance.
The authority fixes the personal responsibility and
accountability uniquely on each person. This is necessary to
ensure progress in action.
INSTITUTIONAL AUTHORITY
The characteristics features of institutional authority are that
they allocate money and other resources and have liberty in
execution.
It is the right given to the employees to exercise power, to
complete the task and force them to achieve their goals.
9. EXPERT AUTHORITY
It is the possession of special knowledge, skills and
competence to perform a job thoroughly, the advice
on jobs, and is a staff function.
COLLECTIVE BARGAINING
International Labor Organization has defined
collective bargaining as “negotiation about working
conditions and terms of employment between an
employer and one or more representative employee’s
with a view to reaching agreement”
10. PROCESS OF COLLECTIVE
BARGAINING
1. Presenting the charter of demands by
the union on behalf of the constituent
elements.
2. Negotiations at the bargaining table
3. Reaching an agreement
11. ARGUMENTS OVER UNIONS
There are two arguments in favor of and against unions.
In favor of unions
It plays a vital role in achieving high salaries and improved
standard of living of employees.
Gives employees a greater sense of participation in organization
decision making.
Can act as counterforce to any radical political movements that
exploit the employees.
Against unions
It Shatter the economy of a country by placing distorting
influences on efficient uses of labor.
Remove negotiation between employers and employees.
12. EXTERNAL RESPONSIBILITIES
The responsibilities to the outside world include:
1.Confidentiality
2.Conflict of Interest and
3.Occupational crimes.
CONFIDENTIALITY
It is widely accepted that the engineers have an obligation to
keep certain information of the employer/client secret or
confidential.
In the same way, engineers have an obligation to keep
proprietary information of their employer/client confidential.
13. Confidential information is information deemed desirable to
keep secret.
Terms related to confidential information.
1.Privileged information – information available to an
employee who is working on a special assignment.
2.Proprietary information – PROPERTY or OWNERSHIP
- a new knowledge established within the organization that can
be legally protected from use by others
3.Trade secrets – these are given limited legal protection
against employee or contractor abuse.
4.Patents – legally protect specific products from being
manufactured and sold by competitors
14. Types of information should be kept
confidential are:
Information about the unreleased products.
Test results and data about the products.
Design or formulas for products.
Data about technical processes.
Organization of plant facilities .
Business information
15. JUSTIFICATION AND LIMITS OF
CONFIDENTIALITY
FIRST LEVEL:
It focuses on 3 moral considerations.
a. Respect for Autonomy – self determination of individuals and
companies in order to recognize their legitimate control over
some information.
b. Respect for promises – signing contracts
c. Respect for Public well-being – when companies maintain
some confidentiality concerning their products.
16. SECOND LEVEL:
Justification by Right Ethicists – justify employees’
obligations of confidentiality by appealing to basic human
rights
Justification by Duty Ethicists – insist on the basic duties
of both employers and employees to maintain the trust and to
commit themselves to an employment agreement they have
made. Justification by Utilitarians .
View by rule Utilitarians – rules governing confidentiality as
justified to the extent that such rules protect the most good for
the greatest number of people.
17. CONFLICTS OF INTEREST:
An individual has two or more desires that all interests
cannot be satisfied given the circumstances.
Professional conflicts of Interest are situations where
professionals have an interest, if pursued, could keep
them from meeting one of their obligations to their
employers.
For Example-
An Employee working in a company depositing
substantial investment in a competitor’s company
18. NSPE says engineers shall not accept financial or
other considerations from material or equipment
suppliers for specifying their product.
Engineers shall not accept commission or
allowances directly or indirectly from the
contractors or other parties dealing with client or
employers.
19. ABET says, Engineer shall not solicit nor accept gratuities
directly or indirectly from the contractors.
Their agents or other parties dealing with their clients or
employers in connection with work from which they are
responsible .
20. OCCUPATIONAL CRIME:
Occupational crimes are illegal acts made
possible through one’s lawful employment.
It is the secretive violation of laws regulating
work activities.
When committed by office workers or professionals, occupational
crime is called ‘white collar crime’.
These crimes are motivated by personal greed, corporate ambition,
misguided company loyalty etc.
21. These crimes impinge on various aspects such as
professionalism, loyalty, conflicts of interest and
confidentiality.
EXAMPLES OF OCCUPATIONAL CRIMES:
Price Fixing
Endangering Lives &
Industrial espionage(spying)
22. PRICE FIXING:
While fixing price for a
product Or service, sometimes
all competitors come together and
jointly set the prices to be
charged. These are called as
“Pricing Cartels”.
In order to avoid these crime
laws areenforced which forbids companies from
Jointly fixing prices.
23. CASE ILLUSTRATION:
Manville Corporation, the largest producer of asbestos in
U.S, knew that asbestos dust was harmful for their employees
health. It could cause a lung disease named “Asbestosis” and an
incurable cancer named “Mesothelioma”.
The company kept this as secret from the employees and the
public. During 1940-1979, over 27 million workers were
exposed to asbestos and more than 10,000 workers have died.
24. INDUSTRIAL ESPIONAGE:
Espionage means Spying.
It refers to secret gathering of information in order to
influence relationships between two entities.
Acquisition of other’s secret to one’s advantage is
Espionage.
The vital information are secretly gathered/theft through
espionage agents called spies.
The information may be intellectual properties such as
designs, prototypes, formulae, software codes,
passwords, manufacturing process, marketing plans,
supplier/contractor details etc.