About an engineer's responsibility and rights he/she having nowadays. This PPT will give them a basic approach towards engineer's work towards public needs that develop the society in this updated world.
Unit-3 Professional Ethics in EngineeringNandakumar P
About an engineer's responsibility towards safety and risk taken by him/her in critical circumstance.
This PPT will give them a basic approach towards engineer's work towards safety for the society.
Unit-3 Professional Ethics in EngineeringNandakumar P
About an engineer's responsibility towards safety and risk taken by him/her in critical circumstance.
This PPT will give them a basic approach towards engineer's work towards safety for the society.
Senses of “Engineering Ethics” – Variety of moral issues – Types of inquiry – Moral dilemmas – Moral Autonomy – Kohlberg‟s theory – Gilligan‟s theory – Consensus and Controversy – Models of professional roles - Theories about right action – Self-interest – Customs and Religion – Uses of Ethical Theories
Morals, values and Ethics – Integrity – Work ethic – Service learning – Civic virtue – Respect for others – Living peacefully – Caring – Sharing – Honesty – Courage – Valuing time – Cooperation – Commitment – Empathy – Self confidence – Character – Spirituality – Introduction to Yoga and meditation for professional excellence and stress management.
Senses of Engineering Ethics– Variety of moral issues – Types of inquiry – Moral dilemmas – Moral Autonomy – Kohlberg‟s theory – Gilligan‟s theory – Consensus and Controversy – Models of professional roles - Theories about right action
Multinational Corporations – Environmental Ethics – Computer Ethics – Weapons Development – Engineers as Managers – Consulting Engineers – Engineers as Expert Witnesses and Advisors – Moral Leadership –Code of Conduct – Corporate Social Responsibility
GE 6075 PROFESSIONALETHICS IN ENGINEERING UNIT HUMAN VALUESPALANIVEL SUBBIAH
PPTs describe Unit of Professional Ethics in Engineering which include Morals, values and Ethics – Integrity – Work ethic – Service learning – Civic virtue – Respect for others – Living peacefully – Caring – Sharing – Honesty – Courage – Valuing time – Cooperation – Commitment – Empathy – Self confidence – Character – Spirituality – Introduction to Yoga and meditation for professional excellence and stress management.
Safety and Risk – Assessment of Safety and Risk – Risk Benefit Analysis and Reducing Risk - Respect for Authority – Collective Bargaining – Confidentiality – Conflicts of Interest – Occupational Crime – Professional Rights – Employee Rights – Intellectual Property Rights (IPR) – Discrimination
he basic rights of engineers include the right to live freely and pursue their legitimate interests as any human being, along with the right to be against racial or sexual discrimination, receiving one's salary according to the work, choosing of political activities, etc., as other employees.
Senses of “Engineering Ethics” – Variety of moral issues – Types of inquiry – Moral dilemmas – Moral Autonomy – Kohlberg‟s theory – Gilligan‟s theory – Consensus and Controversy – Models of professional roles - Theories about right action – Self-interest – Customs and Religion – Uses of Ethical Theories
Morals, values and Ethics – Integrity – Work ethic – Service learning – Civic virtue – Respect for others – Living peacefully – Caring – Sharing – Honesty – Courage – Valuing time – Cooperation – Commitment – Empathy – Self confidence – Character – Spirituality – Introduction to Yoga and meditation for professional excellence and stress management.
Senses of Engineering Ethics– Variety of moral issues – Types of inquiry – Moral dilemmas – Moral Autonomy – Kohlberg‟s theory – Gilligan‟s theory – Consensus and Controversy – Models of professional roles - Theories about right action
Multinational Corporations – Environmental Ethics – Computer Ethics – Weapons Development – Engineers as Managers – Consulting Engineers – Engineers as Expert Witnesses and Advisors – Moral Leadership –Code of Conduct – Corporate Social Responsibility
GE 6075 PROFESSIONALETHICS IN ENGINEERING UNIT HUMAN VALUESPALANIVEL SUBBIAH
PPTs describe Unit of Professional Ethics in Engineering which include Morals, values and Ethics – Integrity – Work ethic – Service learning – Civic virtue – Respect for others – Living peacefully – Caring – Sharing – Honesty – Courage – Valuing time – Cooperation – Commitment – Empathy – Self confidence – Character – Spirituality – Introduction to Yoga and meditation for professional excellence and stress management.
Safety and Risk – Assessment of Safety and Risk – Risk Benefit Analysis and Reducing Risk - Respect for Authority – Collective Bargaining – Confidentiality – Conflicts of Interest – Occupational Crime – Professional Rights – Employee Rights – Intellectual Property Rights (IPR) – Discrimination
he basic rights of engineers include the right to live freely and pursue their legitimate interests as any human being, along with the right to be against racial or sexual discrimination, receiving one's salary according to the work, choosing of political activities, etc., as other employees.
January 2011 - Business Law & Order - Mark HeuselAnnArborSPARK
Hiring practices; Employees vs Independent Contractors; Wage & Hour Issues; Discrimination Issues; Whistleblower protection; Best practices
Mark Heusel is a Member of Dickinson Wright, PLLC’s Ann Arbor office. Dickinson Wright is a international law firm with offices in Michigan, Washington D.C., Nashville, Phoenix, Las Vegas and Toronto. Mr. Heusel works with companies in a variety of circumstances in the commercial litigation and employment law areas. He has substantial experience in advising clients on a host of employment related issues, including litigation avoidance, human resource issues, discrimination and wrongful termination litigation, non-compete and trade secret matters, and business practices. He is also a frequent lecturer and author on these issues and when necessary, a vigorous litigator.
Trade Union Freedom Fact Sheet Cnv InternationaalCNV Vakcentrale
The right to organise in trade unions is a fundamental labour and human right. Yet, in many countries, workers attempt many barriers to organizing. Although the right to organise in trade unions is a fundamental labour and human right. This is usually referred to as: The right to free association in trade unions. Additionally, every individual has the right to collective bargaining over employment conditions. These rights are laid down in national and international legislation and regulations. Such as the International Labour Organization (ILO) conventions, or OECD Guidelines for Multinational Enterprises.
Engaging in a meaningful dialogue
Why is trade union freedom so important? First, to improve labour conditions it is crucial to engage in a meaningful dialogue on factory, sectoral, and even national level. On behalf of their members. Independent trade unions negotiate with employers or their representatives on collective employment conditions, which subsequently are laid down in collective labour agreements. Such working conditions may refer to salary, remuneration, working hours and rest periods. Usually, individuals are not able to reach such agreements, where trade unions are successful.
This fact sheet has been developed for the WellMade project, a project designed to provide both people working in European fashion brands as well as procurement officers within companies and organisations with an understanding of the most important labour issues in the supply chain.
The partners would like to acknowledge the generous support of the European Union in making WellMade possible. This website reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
More information:
http://www.wellmade.org
https://www.cnvinternationaal.nl/
UNIT - 5: Data Warehousing and Data MiningNandakumar P
UNIT-V
Mining Object, Spatial, Multimedia, Text, and Web Data: Multidimensional Analysis and Descriptive Mining of Complex Data Objects – Spatial Data Mining – Multimedia Data Mining – Text Mining – Mining the World Wide Web.
UNIT - 4: Data Warehousing and Data MiningNandakumar P
UNIT-IV
Cluster Analysis: Types of Data in Cluster Analysis – A Categorization of Major Clustering Methods – Partitioning Methods – Hierarchical methods – Density, Based Methods – Grid, Based Methods – Model, Based Clustering Methods – Clustering High, Dimensional Data – Constraint, Based Cluster Analysis – Outlier Analysis.
UNIT 3: Data Warehousing and Data MiningNandakumar P
UNIT-III Classification and Prediction: Issues Regarding Classification and Prediction – Classification by Decision Tree Introduction – Bayesian Classification – Rule Based Classification – Classification by Back propagation – Support Vector Machines – Associative Classification – Lazy Learners – Other Classification Methods – Prediction – Accuracy and Error Measures – Evaluating the Accuracy of a Classifier or Predictor – Ensemble Methods – Model Section.
UNIT - 1 Part 2: Data Warehousing and Data MiningNandakumar P
DBMS Schemas for Decision Support , Star Schema, Snowflake Schema, Fact Constellation Schema, Schema Definition, Data extraction, clean up and transformation tools.
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHONNandakumar P
UNIT-V INTRODUCTION TO NUMPY, PANDAS, MATPLOTLIB
Exploratory Data Analysis (EDA), Data Science life cycle, Descriptive Statistics, Basic tools (plots, graphs and summary statistics) of EDA, Philosophy of EDA. Data Visualization: Scatter plot, bar chart, histogram, boxplot, heat maps, etc.
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHONNandakumar P
UNIT-II CONTROL STRUCTURES& COLLECTIONS
Control Structures: Boolean expressions, Selection control and Iterative control. Arrays - Creation, Behavior of Arrays, Operations on Arrays, Built-In Methods of Arrays. List –Creation, Behavior of Lists, Operations on Lists, Built-In Methods of Lists. Tuple -Creation, Behavior of Tuples, Operations on Tuples, Built-In Methods of Tuples. Dictionary – Creation, Behavior of Dictionary, Operations on Dictionary, Built-In Methods of Dictionary. Sets – Creation, Behavior of Sets, Operations on Sets, Built-In Methods of Sets, Frozen set.
Problem Solving: A Food Co-op’s Worker Scheduling Simulation.
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON Nandakumar P
Unit 1 : INTRODUCTION TO PROBLEM SOLVING, EXPRESSION AND DATA TYPES
Fundamentals: what is computer science - Computer Algorithms - Computer Hardware - Computer software - Computational problem solving using the Python programming language - Overview of Python, Environmental Setup, First program in Python, Python I/O Statement. Expressions and Data Types: Literals, Identifiers and Variables, Operators, Expressions. Data types, Numbers, Type Conversion, Random Number.
Problem solving: Restaurant Tab calculation and Age in seconds.
Python tutorial notes for all the beginners. It is covered with core topics in python with example programs. It is useful for all types of students (school, college (lower and higher level)) and also for teachers, lecturers, assistant professors, and professors.
About Naming Concepts in Distributed systems.
More about its services, its types & the approaches of implementation for Name Space & Name Resolution and Locating Entities Approaches with example diagrams.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
4. Collegiality
Collegiality
is the tendency to support and cooperate with
colleagues.
is a virtue essential for the team work to be effective.
consists of various aspects such as respect to ideas and
work of others, commitment to moral principles,
connectedness.
8/22/2011 School of Computing, Department of IT 4
5. Loyalty
is exhibited in two senses, namely ‘Agency Loyalty’
and ‘Identification Loyalty’.
Agency Loyalty
is an obligation to fulfill his/her contractual duties to
the employer.
These duties are specified in terms of the particular
tasks for which one is paid and in general
cooperating with others in organization.
For engineers, the paramount obligation is still “ the
safety, health and welfare of the public”.
Identification Loyalty
Is concerned with attitudes, emotions and a sense of
personal identity.
Is a more virtue than an obligation
8/22/2011 School of Computing, Department of IT 5
6. Relationship Between Professional
Responsibility and Loyalty
Acting on professional commitments to the public can be
more effective way to serve a company than a mere
willingness to follow company orders.
Loyalty to companies should not be equated with merely
obeying one’s immediate supervisor.
8/22/2011 School of Computing, Department of IT 6
7. Authority
Decisions can be taken by a few people, but putting into
action requires larger participation from different groups
of people such as operation, purchase etc.
In effectively and efficiently transferring decisions to
actions, the authority comes into play a great role.
Clear lines of authority provide a means for identifying
areas of personal responsibility and accountability.
8/22/2011 School of Computing, Department of IT 7
8. Institutional Authority
is the authority exercised within the organization.
is the right given to the employees to exercise power, to
complete the task and force them to achieve their goals.
Duties such as resource allocation, recommendation ,
issue orders on subordinates vested to institutional
authority.
E.g. Project Managers have the institutional duty to
make sure that the products/projects are completed
successfully.
8/22/2011 School of Computing, Department of IT 8
9. Expert Authority
is the possession of special knowledge, skills and
competence to perform a job thoroughly.
is the advice on jobs.
These experts direct others in effective manner.
E.g. adviser, experts and consultants are engaged in an
organization for a specific term.
8/22/2011 School of Computing, Department of IT 9
10. Authority vs. Power
Institutional authority must also be distinguished from
power.
Institutional authority typically carries with it an
allotment of the sources needed to complete tasks.
Ineffectual persons may not be able to summon the power
their position allows them to exercise.
E.g. A manager who lacks the skills of leadership may
be unable to inspire and encourage employees to
produce in ways the institution requires.
8/22/2011 School of Computing, Department of IT 10
11. Accepting Authority
A subordinate is said to accept authority whenever he
permits his behavior to be guided by the decision of a
superior, without independently examining the merits
of that decision.
8/22/2011 School of Computing, Department of IT 11
12. Paramount Obligations
Paramount means “chief in importance or deserving primary
emphasis”.
Engineer’s paramount obligation is to protect the public
health, safety and welfare rather than the obligations of loyalty
and faithful service to employers.
In a technical philosophical sense, whenever the obligations to
employers and the public come into a conflict, the obligation
to the public always takes precedence.
8/22/2011 School of Computing, Department of IT 12
13. Continued…
Obligation to the public should override the obligation to
the employer in cases where something of extreme
importance is at stake for the public: generally where lives
are threatened
Engineers must weigh their obligations to the public, their
employers, their colleagues and others when conflicts
between such obligations arise.
8/22/2011 School of Computing, Department of IT 13
14. Collective Bargaining
is the bargain by the trade union for improving the
economic interests of the worker members.
The process includes negotiation, threatening verbally
and declaration of ‘strike’.
It is impossible to endorse fully the collective bargaining
of unions or to condemn.
There exist always conflicting views between the
professionalism and unionism.
8/22/2011 School of Computing, Department of IT 14
15. Faithful Agent Argument
Professional societies such as NSPE and IEI refuse
to accept the ‘ collective coercive action’ of
unionism, holding the principles of professional
integrity as right.
The actions of unions are usually against the
interests of the employers and they use coercion
and force against the employers.
These actions are interpreted as unprofessional
and disloyal.
The safety of the workers had been ignored for a
long period or employees were under paid for
years.
Can we still hold the action as unethical?
8/22/2011 School of Computing, Department of IT 15
16. Continued…
It can be concluded from this discussion that
The duty of the employee to one’s employer doesn’t
mean sacrifice of monetary self-interests.
Faithful agent means executing the assigned tasks and
safeguarding the property. It does not nullify the right
to negotiate for safe and hygienic working conditions,
and economic benefits collectively.
8/22/2011 School of Computing, Department of IT 16
17. Public Service Argument
The service to the public is of foremost importance.
Unions promote the interests of a few members only.
The public welfare should not suffer because of their
actions.
E.g. Imagine a situation when all teachers, medical
practitioners and ambulance drivers go on strike.
8/22/2011 School of Computing, Department of IT 17
18. Continued…
The collective bargaining cannot be judged as unethical,
unless we study the cases individually and decide
The collective bargaining is acceptable , but the means
should be constructive, persuasive, firm based on mutual
understanding.
8/22/2011 School of Computing, Department of IT 18
19. Union Critics
Unions are main source of inflation.
Unions encourage adversarial, rather than cooperative,
decision making.
They also remove person-to-person negotiations between
employers and employees and make the individual worker
a pawn of the collective bargaining.
Unions encourage unrest and strained relations between
workers and management.
8/22/2011 School of Computing, Department of IT 19
20. Union Supporters
Unions have been the primary factor in creating healthy
salaries and the high standard of living enjoyed by today’s
workers.
They give employees a greater sense of participation in
company decision making.
Unions are a healthy balance to the power of employers to
fire at will.
Unions yield stability by providing an effective grievance
procedure for employee complaints.
8/22/2011 School of Computing, Department of IT 20
21. ConfidentialityKeeping confidences is one of the most central and
widely acknowledged duties of any professional.
E.g. Doctors and counselors must keep information on
their patients confidential.
Teachers must keep at least personal information
about their students confidential.
Confidential information is information deemed
desirable to keep secret.
Confidential information is any information that the
employer or client would like to have kept secret in order
to compete effectively against business rivals.
8/22/2011 School of Computing, Department of IT 21
22. Confidential Information-Related
Terms
On the basis of possession, the confidential information
are divided into two types as follows:
Privileged Information
is a synonym for “confidential information”.
It means “available only on the basis of special
privilege” such as the privilege accorded an employee
working on a special assignment.
It covers information that has not yet become public
or widely known within an organization.
8/22/2011 School of Computing, Department of IT 22
23. Proprietary Information
is information that a company owns or is the proprietor of.
This term is used primarily in a legal sense, just as
“property” and “ownership” are ideas carefully defined by
law.
“Trade Secrets” is a rough synonym for “Proprietary
Information”.
It is protected legally by the organization from use by
others, including the employees.
A limited legal protection is available for this proprietary
information by common law.
8/22/2011 School of Computing, Department of IT 23
24. Patents vs. Trade Secrets
Patents differ from trade secrets.
Patents legally protect specific products from being
manufactured and sold by the competitors without the
express permission of patent holder.
Trade secrets have no such protection.
A corporation may learn about a competitor’s trade
secrets thro’ legal means.
E.g. Reverse Engineering
U.S patents can be held for seventeen years where as trade
secrets have no restrictions.
8/22/2011 School of Computing, Department of IT 24
25. Justification And Limits
Upon what moral basis does the confidentiality obligation
rest, with its wide scope and obvious importance?
The obligation of confidentiality can be justified at two
levels:
The first level is to appeal to three ordinary moral
considerations: respect for autonomy, respect for
promises, regard for public well-being.
The second level is to appeal directly to the major
ethical theories.
8/22/2011 School of Computing, Department of IT 25
26. Continued…
Rights ethicists justify employees’ confidentiality obligation
by appealing to basic human rights.
No employer has a right to safeguard proprietary information
by preventing the engineers from blowing the whistle in cases
where public knowledge of such information would save
human lives and thereby protect the rights of people to live.
Duty ethicists will emphasize the basic duties of both
employers and employees to maintain the trust placed in
them at the time committed themselves to an employment
agreement.
8/22/2011 School of Computing, Department of IT 26
27. Continued…
Rule-utilitarians will view rules governing confidentiality
as justified to the extent that such rules produce the most
good for the greatest number of people.
Act-utilitarians will focus on each instance where an
employer decides on what is count as confidential
information.
8/22/2011 School of Computing, Department of IT 27
28. Changing Jobs
The obligation to protect confidential information doesn’t
stop when employees change jobs.
Former employees would quickly disclose confidential
information to their new employers or perhaps for a price,
sell it to competitors of their former employers.
The relationship between employer and employee in
regard to confidentiality continues beyond the formal
period of employment.
Many engineers value professional advancement more
than long-term ties with any one company and so change
jobs frequently.
8/22/2011 School of Computing, Department of IT 28
29. Management policies
One approach is to use employment contracts
that place special restrictions on future
employment like restriction on geographical
location, type of jobs that one can perform
with future employer.
An incentive instead of threatening their rights
by the employment contract. A lump sum
post-employment payment over a specific
period may be offered as incentive to restrict
him/her.
Another approach by the management is to
effect tighter controls on internal information
flow on trade secrets and other vital features.
8/22/2011 School of Computing, Department of IT 29
30. Conflicts of interest
A conflict of interest occurs when the employee has
more than one interest.
A professional conflict of interest is the situation
where the professional has an interest that, if
pursued, might prevent him/her from meeting
his/her obligations to employers or clients.
Conflicts of interest threaten good judgment in
faithfully serving an employer or client.
8/22/2011 School of Computing, Department of IT 30
31. Conflicts of interest
“conflicting interests” is different from “conflict of
interest”.
E.g. A student may have interests in excelling on four
final exams. She knows, however, that there is time to
study adequately for only three of them and so she
must choose which interest not to pursue.
“Conflicting interests” means a person has two or
more desires that cannot all be satisfied given the
circumstances.
8/22/2011 School of Computing, Department of IT 31
32. Gifts and bribes
A bribe is a substantial amount of money or goods
offered beyond a stated business contract with the
aim of winning an advantage in gaining or keeping
the contract.
Gifts are not bribes as long as they are small gratuities
offered in the normal conduct of the business.
Prearranged payments made by contractors to
companies in exchange for contracts actually granted
are called “kickbacks”.
8/22/2011 School of Computing, Department of IT 32
33. Bribes and gifts
Bribes are illegal or immoral because they are
substantial enough to threaten fairness in competitive
situations, while gratuities are of smaller amounts.
According to ABET, “Engineers shall not solicit nor
accept gratuities directly or indirectly from
contractors, their agents, or other parties dealing with
their clients or employers in connection with work for
which they are responsible”.
8/22/2011 School of Computing, Department of IT 33
34. How does bribe differ from gift?
Tests Bribe Gift
Timing Given before Given after
Cost of item Large amount Small amount, articles of
daily use
Quality of Product Poor Good/High
Transparency Made in secret Made in open
Motive Expect undue favor Thanking for favor
Consequence on
organizations’ good will
Damaging the goodwill
and reputation
No damage is involved.
8/22/2011 School of Computing, Department of IT 34
35. Interests in other companies
Some conflicts of interest consist in having an
interest in a competitor’s or sub-contractor’s business.
E.g. working for the competitor or subcontractor as an
employee or consultant.
Moon lighting
is a situation when a person is working as employee for
two different companies in spare time.
It will lead to conflict of interest.
It leaves the person exhausted and harms the job
performance in both places.
8/22/2011 School of Computing, Department of IT 35
36. Insider information
An especially sensitive conflict of interest consists in
using “inside” information to gain an advantage or set
up a business opportunity for oneself, one’s family or
one’s friends.
The information might concern one’s own company
or another company with which one does business.
E.g. engineers might tell their friends about their
corporation’s plans for a merger that will greatly
improve the worth of another company's stock. In
doing so, they give those friends an edge on an
investment promising high returns.
8/22/2011 School of Computing, Department of IT 36
37. Occupational crime
Occupational crimes are illegal acts made possible
thro’ one’s lawful employment.
It is the secretive violation of laws regulating work
activities.
When committed by office workers or professionals,
occupational crime is called “white-collar crime”.
Employee theft is a type of occupational crime when
it is associated with an employee’s assigned tasks.
8/22/2011 School of Computing, Department of IT 37
38. Industrial espionage
It means simply spying for personal or company benefits.
E.g. Espionage is very common in company manufacturing
computer chips, Ics and microprocessors.
Espionage is more prevalent in computer chips
manufacturing company due to the following factors:
The development of chips is extremely competitive and on
fast track.
Profit and loss can be made quicker
The crime detection and law enforcement are difficult and
ineffective.
The components involved are small. Hence pilferage or
removal or gadgets could be done easily.
8/22/2011 School of Computing, Department of IT 38
39. Price fixing
Fixing the bidding rate by companies, in collusion
with other companies, especially for the
contract/services, is called price fixing.
E.g., This is an occupational crime generally in
electrical equipment industries where there used to be
a few contractors but large number of contracts.
8/22/2011 School of Computing, Department of IT 39
40. Endangering lives
Employers who expose their employees to safety
hazards usually escape criminal penalties.
Victims have the right to sue, but only to claim some
monetary compensation.
Even after 26 years since Bhopal gas tragedy,
appropriate compensation has not been paid.
8/22/2011 School of Computing, Department of IT 40
41. Boot legging
Manufacturing, selling or transporting products that
are prohibited by law is called “bootlegging”.
In engineering context, it refers to working on
projects which are prohibited or not properly
authorized.
8/22/2011 School of Computing, Department of IT 41
42. Rights of engineers
Engineers have several types of moral rights, which
fall into the some times overlapping categories of
human, employee, contractual and professional
rights.
As human beings, engineers have fundamental rights
to live and freely pursue their legitimate interests/
As employees, engineers have special rights,
including institutional rights that arise from specific
agreements in the employment contract.
8/22/2011 School of Computing, Department of IT 42
43. Rights of engineers
Engineers as professionals have special rights that
arise from their professional role and the obligations
it involves.
E.g. Right to refuse to carry out illegal and unethical
activity, the right to protect clients and public from the
dangers.
8/22/2011 School of Computing, Department of IT 43
44. Aspects of professional right
Right of Professional Conscience
The moral right to exercise responsible
professional judgment in pursuing professional
responsibilities.
Pursuing those responsibilities involves
exercising both technical judgment and moral
convictions.
Institutional Recognition of Rights
Having a moral right is one thing . Having it
respected by others and given recognition
within a corporation quite another. When
engineers appeal to the basic right of
professional conscience they may be arguing for
its institutional recognition by employers.8/22/2011 School of Computing, Department of IT 44
45. Aspects of professional right
Specific rights
Obligation to the public might in special situations
require whistle-blowing, and hence engineers have a
limited right to whistle-blow.
The whistle-blowing right becomes more precisely
specified by listing conditions under which whistle-
blowing is permissible.
Right of conscientious refusal
is the right to refuse to engage in unethical behavior, and
to refuse to do so solely because one views it as unethical.
is a kind of second-order right.
8/22/2011 School of Computing, Department of IT 45
46. Aspects of professional right
Right to Recognition
Engineers have a right to professional recognition for
their work and accomplishments.
Part of this involves fair monetary remuneration and
part nonmonetary forms of recognition.
Right to recognition is not sufficiently precise to
pinpoint just what a reasonable salary is or what a
fair remuneration for patent discoveries is.
Such detailed matters must be worked out
cooperatively between employers and employees.
8/22/2011 School of Computing, Department of IT 46
47. Whistle-blowing
is alerting relevant persons to some moral or
legal corruption.
Features of whistle-blowing
Act of disclosure
Information is intentionally conveyed outside
approved organizational channels.
Topic
The information concerns what the person believes
is a significant problem for the organization.
Agent
The person disclosing the information is an
employee or former employee.
Recipient
The information is conveyed to a person or8/22/2011 School of Computing, Department of IT 47
48. Types of whistle-blowing
Based on the destination, whistle blowing is classified
into:
Internal
The information is conveyed to a person within the
organization, but beyond the approved channels.
External
This happens when the information is transmitted outside
the organization.
Based on the source, it is classified into:
Open
Anonymous
Partly anonymous8/22/2011 School of Computing, Department of IT 48
49. When to justify whistle-blowing
When the potential harm existing is identified as
serious or anticipated to occur with a high probability
in the near future.
The concerns have been reported earlier to the
immediate superiors and no satisfactory response was
forthcoming from them, within a reasonable time.
There is a reasonable hope that the whistle blowing
can prevent the damage existing or anticipated.
8/22/2011 School of Computing, Department of IT 49
50. Whistle-blowing
Instructions to be followed before blowing the
whistle:
One should familiarize with the rules for appealing
with in an organization.
Consult the trusted colleagues for advice and to avoid
isolation.
Use polite and tactful language.
Keep the supervisors informed of our actions, thro’
informal discussion.
Keep our observations and claims precise and accurate.
Prepare formal record of events in support of our
victims.8/22/2011 School of Computing, Department of IT 50
51. Employee rights
are any rights , moral or legal, that involve the status
of being an employee.
They include some professional rights that apply to
the employer-employee relationship.
Employee rights include fundamental human rights
relevant to the employment situation.
e.g. the right not to be discriminated against one’s race,
sex, age or national origin.
8/22/2011 School of Computing, Department of IT 51
52. Right to privacy
is the right to control the access to and use of
information about oneself.
is limited in certain situations by employers’ rights.
Only duly authorized persons can get the personal
information.
A supervisor might suspect a worker and conduct a
search in his cupboard when the worker is absent. But
the supervisor is to have another officer as witness in
such cases.
8/22/2011 School of Computing, Department of IT 52
53. Right to choose outside
activities
means right to have a private life outside the job.
There are some situations when this right can be
curbed:
When those activities lead to violation.
When moonlighting.
When the interest of the employer is getting damaged.
8/22/2011 School of Computing, Department of IT 53
54. Right to due process from
employer
is the right to fair process or procedures in firing,
demotion and in taking any disciplinary actions
against employees.
Written explanation should be initially obtained from
the charged employee and the orders are given in
writing with clearly stated reasons.
Fairness here is specified in terms of the process
rather than the outcomes.
8/22/2011 School of Computing, Department of IT 54
55. Intellectual property rights
It is the information and original expression that
derives its original value from creative ideas and is
with a commercial value.
IP permits people to have fully independent
ownership for their innovations and creativity.
This encourages the IP owners towards innovation
and benefit to the society.
The agreements with WTO and Trade-Related
aspects of Intellectual Property System(TRIPS) have
been adopted effective from January 2005.
8/22/2011 School of Computing, Department of IT 55
56. Need for protection of ip
IP prevents others using it.
It prevents using it for financial gain.
It provides a strategy to generate steady income.
It prevents plagiarism.
8/22/2011 School of Computing, Department of IT 56
57. Types and norms
Patents
is a contract between the individual and the society.
Patents protect legally the specific product from sold by
others without the permission of patent holder.
Types of patents are
Utility patent
Industrial Design Patent
8/22/2011 School of Computing, Department of IT 57
58. copyright
The copyright is specific and exclusive right,
describing rights given to creators for their literary
and artistic works.
This protects literary material, aesthetic material,
music, paintings etc.
Copy right gives protection to particular expression
and not for the idea.
8/22/2011 School of Computing, Department of IT 58
59. trademark
Trademark is a wide identity of specific good and
services, permitting differences to be made among
different trades.
It is a territorial right which needs registration.
Registration is valid initially for 10 years and
renewable.
It may be registered in form of a heading, label, a
ticket, a word, logos.
8/22/2011 School of Computing, Department of IT 59
60. Trade secret
Trade secret is the information which is kept
confidential as a secret.
This information is not accessed by other than the
owner and this gives a commercial advantage over the
competitors.
Trade secrets are not registered but only kept
confidential.
Trade secrets may be formulae or methods or test
results or data collected, analyzed and synthesized.
This information should not be disclosed or used by
any other person.8/22/2011 School of Computing, Department of IT 60
61. discrimination
is morally unjustified treatment of people on arbitrary
or irrelevant grounds.
Because of caste, sex, religion and language are
regressive actions.
Is to condemn it.
Reverse preferential treatment is giving an advantage
to a member of a group that in the past was denied
equal treatment, in particular, women and minorities.
8/22/2011 School of Computing, Department of IT 61
62. Discrimination-examples
A senior manager post is vacant. There is competent
ad proven candidate from outside the state. A local
engineer with lesser competence is proved.
Prize amounts for the winners in the world sport are
not the same for men and women.
8/22/2011 School of Computing, Department of IT 62
63. Preferential treatment
Hiring a woman or a member of minority over an
equally qualified while male is only one form of
preferential treatment. Let us call it the weak form.
The strong form by contrast consists in giving
preference to women or minorities over better-
qualified white males.
8/22/2011 School of Computing, Department of IT 63
64. Pro- and –against reverse
preferential treatment
In favor of reverse preferential
treatment
Against reverse preferential
treatment
Compensatory justice: violations of
rights in the past must be
compensated. Usually this treatment is
extended to all the group rather than
individuals
Compensation may be given only to
specific individuals and not for all
Racial and sexual violation and
violence still exist today. To counter
balance this, the reverse preferential
treatment is necessary to ensure equal
opportunity to minorities and women.
It violates the rights to equal
opportunity for majority, to compete
on merits.
8/22/2011 School of Computing, Department of IT 64
65. Sexual harassment
is a particularly offensive form sex discrimination,
involving as it doesn’t only the abuse of gender roles
and work-related power relationships , but the abuse
of sexual intimacy itself.
Is currently applied to a wide variety of sexually
oriented acts and practices that may involve physical
and psychological attacks, abuse of authority, force
and a variety of unwanted provocations.
8/22/2011 School of Computing, Department of IT 65
66. Sexual harassment
may come in many forms:
Sexual Threats
Sexual offer
Sexual assaults
Sexual annoyance
E.g.
Following an interview for a job as secretary, a woman
is told that the job is hers if she is willing to grant
sexual favors to the interviewer.
A woman is told by her superior that she will have first
priority for receiving a promotion if she is “nice” to him.8/22/2011 School of Computing, Department of IT 66
67. bibliography
Text Book
Mike Martin and Roland Schinzinger, Ethics in
Engineering, Mcgraw Hill, New York, 1996.
Reference Books
M.Govindarajan, S.Natarajan, V.S.SenthilKumar,
Engineering Ethics, PHI, 2004.
Charles D.Fleddermann, Engineering Ethics, Prentice
Hall, New Mexico, 1999.
R.S.Naagarazan, Professional Ethics and Human Values,
New Age International Publishers, 2006.
8/22/2011 School of Computing, Department of IT 67
68. Review questions
What is collegiality?
Name two senses of loyalty.
What is meant by proprietary information?
How do ethical theories justify confidentiality?
What is moonlighting?
What is bootlegging?
List a few non-contractual employee rights.
Differentiate patent and trade secrets.
What is meant by whistle blowing?
List four aspects of whistle blowing.
8/22/2011 School of Computing, Department of IT 68