Date post: | 24-May-2015 |
Category: |
Documents |
Upload: | junaidjuanid |
View: | 480 times |
Download: | 4 times |
BS IT Semester 8th
University of Education, Lahore
Professional ethics
Ethics
Ethics can be defined broadly asa set of moral principles or values.
Protect an organization and its employees from legal action.
Create an organization that operates consistently.
Provide a livelihood for employees. Avoid unfavorable publicity. Gain the goodwill of the community.
Why Ethics are Important
Bribes involve providing money, property, favors, or anything else of value to someone in business or government in order to obtain a business advantage.
Gifts are made openly and publicly as a gesture of friendship or goodwill with no expectation of a future favor for the donor.
Legal Overview
Appoint a corporate ethics officer. Ethical standards should be set by a board of
directors. Establish a corporate code of conduct. Conduct social audits. Require employees to take ethics training. Include ethical criteria in employee
appraisal/reward systems.
Improving Corporate Ethics
A guide that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and that can help in decision making.
The code of conduct helps ensure that employees:
◦ Abide by the law. ◦ Follow necessary regulations.◦ Behave in an ethical manner.
Code of Conduct
Sample Code of Conduct from Proctor and Gamble
Code of Conduct
1. Get the facts.2. Identify the stakeholders and their positions.3. Consider the consequences of your decision.4. Weigh various guidelines and principles
(Virtue, Utilitarian, Fairness, Common Good). 5. Develop and evaluate options.6. Review your decision.7. Evaluate the results of your decision.
Ethical Decision Making
Four Common Approaches Used in Ethical Decision-Making
Approach to Dealing with Moral Issues
Principle
Virtue Approach The ethical choice is the one that best reflects moral virtues in ourselves and our community.
Utilitarian Approach The ethical choice is the one that produces the greatest excess of benefits over harm.
Fairness Approach The ethical choice is the one that treats everyone the same and does not show favoritism or discrimination.
Common Good Approach
The ethical choice is the one that advances the common good.
The increased use of information technology has raised many ethical issues for today’s IT professional.◦ Licensing of IT professionals◦ Internet communication ◦ Intellectual property◦ Employee/employer issues
Ethics in Information Technology
◦Today’s workers are subject to the monitoring of their e-mail and Internet access while at work, as employers and employees struggle to balance the need of the employer to manage important company assets and employees’ work time versus the employees’ desire for privacy and self-direction.
Ethics in Information Technology
◦ Students around the world have been caught downloading material from the Internet and plagiarizing content for their term papers.
◦ Hackers engaged in acts of cyberterrorism defaced hundreds of Web sites and left hate messages after a collision between a United States spy plane and a Chinese jet fighter.
Ethics in Information Technology
Why People Act Unethically
The person’s ethical standards are differentfrom those of society as a whole.
The person chooses to act selfishly.
In many instances, both reasons exist.
A Person’s Ethical StandardsDiffer from General Society
Embezzlers Con artists Shoplifters
Most people who commit such acts feel noremorse when they are apprehended becausetheir ethical standards differ from those ofsociety as a whole.
RationalizingUnethical Behavior
Everybody does it.
If it’s legal, it’s ethical.
Likelihood of discovery and consequences
Ethical Dilemmas
An ethical dilemma is a situation aperson faces in which a decision mustbe made about appropriate behavior.
Resolving Ethical Dilemmas
1. Obtain the relevant facts.
2. Identify the ethical issues from the facts.
3. Determine who is affected.
Resolving Ethical Dilemmas
4. Identify the alternatives available to theperson who must resolve the dilemma.
5. Identify the likely consequenceof each alternative.
6. Decide the appropriate action.
Ethical Dilemma
A staff person has been informed that he will work hours without recording them as hours worked.
Firm policy prohibits this practice.
Another staff person has stated that
this is common practice in the firm.
Resolving the Ethical Dilemma
Is it ethical for the staff person towork hours and not record themas hours worked in this situation?
Who is affected?
How are they affected?
What alternatives does the staff person have?
Special Need for Ethical Conduct in Professions
Our society has attached a specialmeaning to the term professional.
A professional is expected to conducthimself or herself at a higher levelthan most other members of society.
Special Responsibilities of IT Professionals Maintaining relationships with and responsibilities
toward customers, clients, coworkers, employees, and employers.
Making critical decisions that have significant consequences for many people.
Determining how to manage, select, or use computers in a professional setting.
Ethics for IT Professionals
IT Professionals should experts in their field, Know customers rely on their knowledge, expertise,
and honesty, Understand their products (and related risks) affect
many people, Follow good professional standards and practices, Maintain an expected level of competence and are
up-to-date on current knowledge and technology, and
Educate the non-computer professional.
Ethics for IT Professionals
24
Professional ethics concerns: One's conduct of behaviour and practice while doing
professional work, Relations with peers in the work place, Conduct of duties towards the employer, Obligations towards the customer, Responsibility for the future of the profession at large. Responsibility for the wellbeing of the society at large.
Ethics for IT Professionals
25
1. to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment;
2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist;
3. to be honest and realistic in stating claims or estimates based on available data;
4. to reject bribery in all its forms;
5. to improve the understanding of technology, its appropriate application, and potential consequences;
IEEE Code of Ethics
26
6. to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations;
7. to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others;
8. to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin;
9. to avoid injuring others, their property, reputation, or employment by false or malicious action;
10. to assist colleagues and co-workers in their professional development and to support them in following this code of ethics.
IEEE Code of Ethics
A Code of Ethics enables us to: Set out the ideals and responsibilities of the profession Exert a de facto regulatory effect, protecting both clients and
professionals Improve the profile of the profession Motivate and inspire practitioners, by attempting to define their raison
d'être Provide guidance on acceptable conduct Raise awareness and consciousness of issues Improve quality and consistency
CmpE 598- 28.03.2006
Advantages of a Code of Ethics
On the other hand, we must also consider: Whether the so-called standards are obligatory, or are
merely an aspiration Whether such a code is desirable or feasible Whether ethical values are universal or culturally
relativistic The difficulty of providing universal guidance given the
heterogeneous nature of the profession What the point is of specifying responsibilities, given the
limited regulatory function of a code.
CmpE 598- 28.03.2006
Disadvantages of a Code of Ethics
The Social Context of Computing
The social implications of computing is a growing topic
This topic has many subsets◦ Economics, politics, ethics, crime…
The purpose of studying this topic◦ To create awareness and educate◦ Prevent problems before they occur◦ Work together as a society to understand the issues
and develop solutions
Introduction
Concept of an “information society” came about in the early 1960’s
38 Years for 30 percent of America to own a telephone
7 Years for 30 percent of America to be connected to the internet
In 2000, 55,000 people each day used the internet for the first time
Historical Perspective
Governments and individuals believe much of the information on the Internet is subversive, dangerous, or immoral◦ Prime example: pornography◦ In 2001, Spam was eight percent of all emails◦ In 2003, Spam was 40 percent of all emails
Child Internet Protection Act
Ethical Issues
Exchange of information among individuals and groups
Does technology decrease social activity??? Internet relationships can lead to disaster
◦ Lack of authenticity leads to misleading◦ Exploitation of America’s youth by predators
Social Interaction
“Digital technology’s ubiquity and its increasing invisibility have the effect of making it appear almost natural” (Gene, 198)
Privacy will become a larger issue
“In a World Without Secrets, many of the secrets we lose are those that we give away freely, without thinking, in return for the elimination of some small frictions” (Richard, 256)
Future Perspective
Social Implications of Network
Communication
Everyone can converse with anyone. Computer networks compress time and
space However, the physical attributes of a
conversation are also lost.
Network Individualism
The lost attributes like body language, facial expression and tone of voice cannot be replaced .
Users have not replaced but rather supplemented the new methods to enhance communication.
Users have develop new ways to express the commonly used emotions. ; )
Computer-Mediated Communication (CMC)
Email, Instant Messaging Both end users know who the other person is
to some extend. Email and IM is like a home address and a
telephone number.◦ A level of privacy is expected.◦ Users expect to know who and why they are being
contacted in those mode.
One-to-One Correspondence
Mailing Lists, Web Forums, Chat Rooms, Internet Relay Chat (IRC)
All these mode of communication gives the user a high level of anonymity. Users are often known only by a nickname.
Users can use different or multiple aliases. ◦ Can be use for malicious intend◦ Users gravitate toward a known group of trusted
users
Many-to-Many Correspondence
The Internet was envisioned during the arms race with Russia.
It was created in 1969 by the Advanced Research Projects Agency (ARPA).
In 1972, electronic mail was introduced by Ray Tomlinson, a computer scientist.
A Brief History of internet
In 1973, the Transmission Control Protocol/Internet Protocol (TCP/IP) is designed.
In 1983 this protocol becomes the standard for communicating between computers over the Internet.
Finally, in 1982 the term “Internet” is coined.
History continued
In the beginning, the Internet is simply packet switching and emails.
It is not until 1989 that the Internet becomes available to the public and user friendly when The World debuts.
Tim Berners-Lee of CERN (European Laboratory for Particle Physics) develops a new technique for distributing information on the Internet.
Growth and Access
He calls it the World Wide Web. The Web is based on hypertext. It allows the user to connect from one
document to another at different sites on the Internet through hyperlinks.
The Web is accessible through a graphical user interface (GUI).
Growth and Access
1995 - CompuServe, America Online, and Prodigy start providing dial-up Internet access.
1996 - Approximately 45 million people are using the Internet, with roughly:◦ 30 million of those in North America (United
States and Canada)◦ 9 million in Europe◦ 6 million in Asia/Pacific (Australia, Japan, etc.)
Growth and Access
By 1999, the number of Internet users worldwide reaches 150 million and more than 50% are from the United States.
“E-commerce” becomes the new buzzword as Internet shopping spreads like wildfire.
Growth and Access
In 2000, the never ending flow of fortunes coming from Internet is halted.
Investment capital dries up and the Nasdaq stock index plunges
This causes many dotcom companies to go bankrupt.
Growth and Access
In 2001, about 9.8 billion electronic messages are sent daily.
In 2002 of January, 58.5% of the U.S. population (164.14 million people) uses the Internet. Worldwide there are 544.2 million users.
Growth and Access
The Internet has grown rapidly since its birth at ARPA.
It has become a societal standard within America.
We can try to control it, but we will never be able to fully harness it.
It is a conglomerate of the minds of the world. Some beautiful and some hideous, but perhaps one day, unifying.
Conclusion
Declining number of female computer science students for the past 20 years
Gender-Related Issues of Computing
Cultural factors Negative images Sexual discriminations
Some of the Causes
Computer games◦ Designed based on male interests
High school teachers and counselors◦ Usually influenced by sexual stereotype◦ Discourage young girls to get involved in
computing
Cultural Factors
False images of computing careers◦ Nerdy, geeky, antisocial, unfeminine
Computing as a male domain◦ Advertisements and articles are all male
dominated◦ A PC World article featured 16 men pioneers of
PC, but not a single woman
Negative Images
Another major issue Mostly subconscious
◦ Invisibility◦ Dirty jokes◦ Negative stereotype of women◦ Display of nude/partially nude posters
Sexual discrimination
Work with parents, teachers, and counselors Higher profile for women in computing
◦ More articles written by women◦ Female representatives at career fairs
Awareness of subtle sexual discrimination
Recommendations
Under-representation of women in computing◦ Generally caused by stereotype and
discrimination◦ Understand the causes◦ Try to correct them
Conclusion
Automation of several manual process A large increase in productivity and substantial decrease in costs.
Reduction of Manufacturing Jobs Work load shifted on Robust Machines with less need of labors.
Financial Engineering Monitoring system in stocks all over the world The Return of the Cottage Industry Sole Application Development Global Communication Better results in import and export business Financial Transparency Less chances of insecure monetary Financial Hazards Fraudulent, Spammers, Hackers and Data
insecurity Enhancement in B2B Processes Out sourcing Virtual Markets Giving worth to waste objects (E-Commerce) Project Management Efficient Process Flow Management Research and Development Make your life better You are poor if you are not computerized!!!
Economical Context of Computing
◦ Millions of people have used Napster software to download music at no charge and in apparent violation of copyright laws.
◦ DoubleClick, an advertising network that tracks users as they move around the Internet, was sued after it revealed plans to match a mass mailing marketing list with its anonymous database of Internet users, thus revealing the Web users’ identities.
Ethics in Information Technology
AICPA Code of Professional Conduct
Principles
Rules ofconduct
Interpretationof the rulesof conduct
Ethicalrulings
Four parts to the Code:
Code of Professional Conduct
Principles
Ideal standards of ethicalconduct in philosophical terms
They are not enforceable.
Rules ofconduct
Minimum standards of ethicalconduct stated as specific rules
They are enforceable.
Code of Professional Conduct
Interpretationof the rulesof conduct
Interpretation of the rules ofconduct by the AICPA Divisionof Professional Ethics
They are not enforceable, but apractitioner must justify departure.
Code of Professional Conduct
Ethicalrulings
Published explanations and answersto questions about the rules of conductsubmitted to the AICPA by practitionersand others interested in ethical requirements
They are not enforceable, but apractitioner must justify departure.
Ethical Principles
1. Responsibilities
Professionals should exercise sensitive andmoral judgments in all their activities.
Members should accept the obligation to actin a way that will serve and honor the public.
2. Public Interest
Ethical Principles
3. Integrity
Members should perform all responsibilitieswith integrity to maintain public confidence.
Members should be objective, independent,and free of conflicts of interest.
4. Objectivity and Independence
Ethical Principles
5. Due Care
Members should observe the profession’sstandards and strive to improve competence.
A member in public practice should observe the Code of Professional Conduct.
6. Scope and Nature of Services
Information Technology
The technology involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data.
The branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information.
What is Information Technology..?
What is Computer Science…?
Computer Science is the systematic study of algorithmic methods for
representing and transforming information's, including their:
i. Theoryii. Designiii. Implementationiv. Applicationv. Efficiency
The process of utilizing computer technology to complete a task. Computing may involve computer hardware and/or software, but must involve some form of a computer system. Most individuals use some form of computing every day whether they realize it or not. Swiping a debit card, sending an email, or using a cell phone can all be considered forms of computing.
WHAT IS COMPUTING?
Algorithms and Data Structures Architecture Artificial Intelligence and Robotics Database and Information Retrieval Human-Computer
Communication(GRAPHICS) Numerical and Symbolic Computation Operating Systems(NETWORKS) Programming Languages Software Methodology and Engineering
SUBJECT AREAS OF COMPUTING:
“Security or protection of Personal Data”.Need for Info Privacy:• Medical records• Financial data, • Criminal records• Political records • Business related information or • Website data.
Misuse of term “Privacy”. To security of data against various risks. To the risks of data being accessed or modified by unauthorized
persons. To refer only to the security of data during transmission.
Information Privacy
Information security means protecting information and information system from unauthorized access modification or destruction.
There are three principles about information security
Confidentiality: Ensuring that information is accessible only
to those authorized to have access
Integrity:Safeguarding accuracy completeness and control of
information
Availability:Ensuring that authorized people have access to
information
What is information security
Deter. Have in place the means to avoid or prevent the occurrence of preventable information security breaches.
Protect. Be in a position to safeguard your information assets from security breaches.
Detect. Equip yourself to rapidly detect the occurrence of security breaches.
Respond. Be ready to react to rapidly overcome the effects of security breaches.
Recover. Be able to restore the integrity, availability and confidentiality of information assets to their expected state.
How to defend such events
The professional competency system is designed to be straightforward, practice-based and focused on patient safety.
Professional development is an ongoing process ofassessment and planned actions that provide the
opportunity for:Maintaining and expanding knowledge and skills based on evidence Self-reflection about and facilitation of professional core values Autonomous practice within the context of one’s practice setting Creating, anticipating, and actively responding to changes in an evolving health care system Induction into new responsibilities Acquisition of contemporary clinical and practice management knowledge, skills, and abilities
Life long is therefore about:
acquiring and updating all kinds of abilities, interests, knowledge and
qualifications. valuing all forms of learning. Insight into the demand for learning. Adequate resourcing. Facilitating access to learning opportunities. Creating a learning culture
The systematic maintenance and improvement of knowledge, skills, and abilities through one’s professional career or working life. Lifelong learning is the ongoing process by which the quality and relevance of professional services are maintained.
Professional competence is the Habitual and judicious use of communication Knowledge Technical skills Emotions Value Reflection in daily practice for the benefit of the individual
and community being served.
Professional Competence
Cognitive◦ Core knowledge ◦ Information management ◦ Applying knowledge to real-world situations ◦ Using personal experience Abstract problem-solving
Relationship◦ Communication skills ◦ Handling conflict ◦ Teamwork ◦ Teaching others (eg, patients, students, and colleagues)
Affective/Moral Tolerance of ambiguity and anxiety Emotional intelligence
Habits of Mind◦ Observations of one's own thinking emotions, and techniques ◦ Attentiveness ◦ Willingness to acknowledge and correct errors
Dimensions of Professional Competence:
The systematic maintenance and improvement of knowledge, skills, and abilities through one’s professional career or working life. Lifelong learning is the ongoing process by which the quality and relevance of professional services are maintained.
Life long learning
acquiring and updating all kinds of abilities, interests, knowledge and qualifications.
valuing all forms of learning. Insight into the demand for learning. Adequate resourcing. Facilitating access to learning opportunities. Creating a learning culture
Life long is therefore about:
Risks are potential problems that may affect successful completion of a software project.
Risks involve uncertainty and potential losses.
79
What is Risk?
Project risks◦ threaten the project plan
Technical risks◦ threaten product quality and the timeliness
of the schedule Business risks
◦ threaten the viability of the software to be built (market risks, strategic risks, management risks, budget risks)
80
Software Risks - 1
Known risks◦ predictable from careful evaluation of current
project plan and those extrapolated from past project experience
◦ e.g. virus attacks
Unknown risks◦ some problems will simply occur without
warning
81
Software Risks - 2
A risk is a potential problem – it might happen and it might not Conceptual definition of risk:
◦ Risk concerns future happenings◦ Risk involves change in mind, opinion, actions, places, etc.◦ Risk involves choice and the uncertainty that choice entails
Two characteristics of risk:◦ Uncertainty – the risk may or may not happen, that is, there are
no 100% risks (those, instead, are called constraints)◦ Loss – the risk becomes a reality and unwanted consequences
or losses occur
Definition of Risk
Risk CategorizationProject risks: (They threaten the project
plan).
Technical risks :(They threaten the quality and
timeliness of the software to be
produced).
Business risks: (They threaten the viability of
the software to be built).
Known risk:(Those risks that can be uncovered after careful evaluation
of the project plan) Predictable risk:(past
turnover).
Unpredictable risks: (are extremely difficult to identify in advance).
Reactive risk strategies: (Don't worry, I'll think of
something).
Proactive risk strategies:(Primary objective is to avoid risk and to have a contingency plan).
Steps for Risk Management
Identify possible risks.analyze each risks.
Develop a contingency plan .
*Software that we used Daily: Improving computer Life. . Microsoft office . Mozilla Firefox . Google Apps . Adobe Photoshop . Adobe Acrobat professional *Software used in Education..Productivity Software . Word Processing Software.Spreadsheet Software . Educational Software for Teachers *Software used in Animation Web & Graphic design , VFX & Gaming.*Software used in Medical Field..Med iSOFT Medical Billing Software . Recur Electronic Prescribing Software . Araxes Electronic Medical Record Software
Uses Of Software