Chapter 1 - Introduction to Social & Professional Issues PDF

Summary

This document covers introductory concepts in social and professional issues. Topics like social problems, professional concerns, and ethical dilemmas in IT are explained. Various professional codes of ethics are also discussed, particularly for IT professionals. It is intended for an undergraduate or introductory course on these topics.

Full Transcript

INTROD UCTI ON T O SO C I A L & PROFESS I ONA L I SS U ES MARY ANTONIETTE S. ARIŃO INSTRUCTOR SOCIAL ISSUES Social issues are topics or subjects that impact many people they often reflect current events but also represent longstan...

INTROD UCTI ON T O SO C I A L & PROFESS I ONA L I SS U ES MARY ANTONIETTE S. ARIŃO INSTRUCTOR SOCIAL ISSUES Social issues are topics or subjects that impact many people they often reflect current events but also represent longstanding problems or disagreements that are difficult to solve. Beliefs, opinions, and viewpoints can be strong, and debate on these topics is a natural outcome of public discourse. EXAMPLE OF SOCIAL ISSUES A social problem is an issue within the society that makes it difficult for people to achieve their full potential. Poverty, unemployment, unequal opportunity, racism, and malnutrition are examples of social problems. So are substandard housing, employment discrimination, and child abuse and neglect. PROFESSIONAL ISSUES Professional issues encompass a wide range of concerns within various professions, including socio-political and cultural contexts, employment, career development, relationships with other professionals, and personal reflections. EXAMPLE OF PROFESSIONAL ISSUES The most commonly experienced ethical issues include discrimination, harassment, unethical accounting, technological abuse, data privacy, health and safety, and favoritism and nepotism. Most of these concerns are experienced in workplaces. DIFFERENCE BETWEEN ETHICAL & PROFESSIONAL ISSUES Personal ethics refers to the ethics that a person identifies with in respect to people and situations that they deal with in everyday life. Professional ethics refers to the ethics that a person must adhere to in respect of their interactions and business dealings in their professional life. An ethical issue is a circumstance in which a moral conflict arises in the workplace; thus, it is a situation in which a moral standard is being challenged. Ethical issues in the workplace occur when a moral dilemma emerges and must be resolved within a corporation. EXAMPLE OF ETHICAL ISSUES Some of the prominent ethical issues in information technology include: Privacy and data protection: collecting, storing, and using personal data raises significant ethical concerns. Protecting individuals' privacy rights through data privacy measures, informed consent, and robust security is essential. QUESTION? ASSESSMENT TASKS #1 & 2 GET SHORT BOND PAPER. USE THE GIVEN FORMAT READ THE SITUATION & ANSWER THE GIVEN QUESTIONS. END COMP UTER ETHI CS LEARNING OUTCOMES At the end of this chapter, the student is expected to: 1. State the principle of ethics of Filipino IT professionals; 2. Apply the principles formulated by the association of computing machinery in dealing with other people, in making judgment, in software designs and all other dealings in the exercise of the IT profession; 3. Explain the ten commandments of computer ethics; 4. Identify problems in a work scenario; 5. Be a morally responsible student; and 6. Manifest ethical thinking skills in analyzing and justifying computing issues. PROFESSIONAL CODE OF ETHICS Professional code of ethics is a set of guidelines which are designed to set out acceptable behavior of member of a particular group, association, or profession. A professional code of ethics states the principles and core values that are essential to the work of a particular occupational group. Practitioners in many professions subscribe to a code of ethics that governs their behavior. For example, doctors adhere to varying versions of the 2000-year-oldhippocratic oath, which medical schools offer as an affirmation to their graduating classes. 2 PARTS OF CODES OF ETHICS CREATED BY PROFESSIONAL ORGANIZATIONS HAVE 1. outlines what the organizations aspires to become, and 2. typically lists rules and principles by which members of the organization are expected to abide. Many codes also include a commitment to continuing education for those who practice the profession. Laws do not provide a complete guide to ethical behavior. Just because an activity is not defined as illegal does not mean it is ethical. You also cannot expect a professional code of ethics to provide an answer to every ethical dilemma- no code can be definitive collection of behavioral standards. FOLLOWING A PROFESSIONAL CODE OF ETHICS CAN PRODUCE MANY BENEFITS FOR THE INDIVIDUAL, THE PROFESSION AND SOCIETY AS A WHOLE: 1. Ethical decision making: adherence to professional code of ethics means that practitioners use a common set of core values and beliefs as a guideline for ethical decision making. 2. High standards of practice and ethical behavior: adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business. 3. Trust and respect from the general public: public trust is built on the expectation that a professional will behave ethically. People must often defend on the integrity and good judgments of a professional to tell the truth, abstain from giving self- service advice, and offer warnings about the potential negative side effects of their actions. Thus, adherence to a code of ethics enhances trust and respect for professionals and their profession. 4. Evaluation benchmark: a code of ethics provides an evaluation benchmark that a professional can use as a means of self- assessment. Peers of the professional can also use the code for recognition or censure. CODE OF ETHICS OF THE FILIPINO IT PROFESSIONALS 1. I will promote public knowledge, understanding and apprecia tio n of in formation technolo gy. 2. I will consider the general welfare and public welfare and public good in the performance of my work. 3. I will advertise goods or professional services in a clear and truthful manner. 4. I will comply and strictly abide by the in tellectual property laws, patent laws and other related laws in respect of informatio n technology. 5. I will accept the full responsibility for the work undertaken and utilize my skills with competence and professionalism. 6. I will make truthful statements on my areas of competence as well as the capabilities and qualities of my product and service. 7. I will not disclose or use any confidential information obtained in course of professional duties without the consent of the parties concerned except when required by the laws. 8. I will strive to attain the highest quality in both the products and services that offer. 9. I will knowingly participate in the development of the information technology. 10. I will uphold and improve the IT professional’s standard through continuing profession in order to enhance the IT profession. CODE OF ETHICS OF INFORMATION TECHNOLOGY PROFESSIONALS (AITP) The code of ethics of the association of information technology professionals (AITP) is a set of guidelines that governs the professional behavior and decision-making of its members. This code is designed to ensure that IT professionals act with integrity, responsibility, and professionalism in their work. Although the AITP is now part of CompTIA, the principles of its code of ethics remain relevant to the profession. COMPTIA CompTIA (The Computing Technology Industry Association) is a leading global organization that provides training, certification, and advocacy for the information technology (IT) industry. Founded in 1982, CompTIA is a non-profit trade association that serves the interests of IT professionals and companies, helping to advance the IT industry through education, certification programs, and policy advocacy. KEY PRINCIPLES OF THE AITP CODE OF ETHICS 1. Integrity IT professionals must conduct themselves with honesty and integrity, ensuring their actions reflect positively on the profession. They should avoid conflicts of interest and ensure their work benefits their clients, employers, and society. 2. Confidentiality Members are responsible for maintaining the confidentiality of information obtained during their professional activities. They should protect sensitive data from unauthorized access and not disclose information without proper authorization. 3. Competence IT professionals should strive for continuous improvement in their skills and knowledge. They must ensure they are adequately qualified to perform their work and should seek opportunities for professional development. 4. Professionalism Members should uphold the highest standards of professionalism in their work, treating clients, colleagues, and stakeholders with respect. They must act in a manner that enhances the reputation of the it profession. 5. Responsibility to employers and clients: IT professionals should be loyal to their employers and clients, providing services that are in their best interest. They must ensure their work is of high quality and delivered in a timely manner, while also being transparent about any limitations or challenges. 6. Fairness Members must treat everyone fairly and without discrimination, regardless of race, gender, religion, age, or other characteristics. They should promote equal opportunities in their workplaces and communities. 7. Social responsibility IT professionals have a responsibility to contribute positively to society and the public good. They should consider the broader impact of their work and strive to promote the ethical use of technology. 8. Respect for intellectual property Members must respect the intellectual property rights of others, including patents, copyrights, and trade secrets. They should avoid using or sharing proprietary information without permission. 9. Compliance with laws and regulations IT professionals should comply with all relevant laws and regulations governing their work. They must act within legal and ethical boundaries and report any unethical or illegal activities. IMPORTANCE OF THE AITP CODE OF ETHICS Guidance: the code of ethics provides IT professionals with a framework for making ethical decisions and handling complex situations in their work. Trust: by adhering to these ethical standards, it professionals build trust with employers, clients, and the public, which is crucial for the credibility and effectiveness of the it profession. Professional standards: the code helps maintain high standards within the it profession, ensuring that members uphold the values of honesty, integrity, and fairness. STRENGTHS & WEAKNESSES OF AITP CODE OF ETHICS Strengths Weaknesses  Codes inspire the member of a profession to behave ethically.  Directives included in many codes tend to be too general and too vague.  Codes guide the member of a profession in ethical choices.  Codes are not always helpful when two or more directives conflict.  Codes educate the members of profession about their professional obligations.  A professional code’s directives are never complete or exhaustive.  Codes discipline members when they violate one or more of the code’s directives.  Codes are ineffective (have no “teeth” ) in disciplinary matters.  Codes “sensitize’ members of a profession to ethical issues and otherwise might overlook.  Directives in codes are sometimes inconsistent with one another.  Codes inform the public about the nature and roles of the professions.  Codes do not always distinguish between microethics issues and macroethics issues.  Codes enhance the profession in the eye of the public.  Codes can be self-serving for the profession. THE TEN COMMANDMENTS OF COMPUTER ETHICS The Ten Commandments of Computer Ethics have been defined by the computer ethics institute. Here is the interpretation of them: 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect. WHAT IS COMPUTER ETHICS? It is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develop. The term “computer ethics” is open to interpretations both broad and narrows. Example, computer ethics might be understood very narrowly as the efforts of professional philosopher to apply traditional ethical theories like utilitarianism, kantianism, or other moral theories to issues regarding the use of computer technology. On the other hand, it is possible to construe computer ethics in a very broad way to include, as well, standard of professional practice, codes of conduct, aspects of computer law, public policy, corporate ethics—even certain topics in the sociology and psychology of computing. Computer ethics in the broadest sense can be understood at that branch of applied ethics which studies and analyzes such social and ethical impacts of information technology. In recent years, this robust new field has led to new university courses, conferences, workshop, professional organizations, curriculum materials, books, articles, journals, and research centers. And in the age of the world-wide-web, computer ethics is quickly being transformed into “global information ethics”. Computer ethics deals with practical problems and focuses on the nature of moral action and responsibility how do I know whether or not an action is morally right or wrong? PROBLEM IN COMPUTER ETHICS A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Computer provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situation exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, that is, formulate policies to guide our actions… one difficulty is that long with a policy vacuum there is often a conceptual vacuum. Although a problem in computer ethics may seem clear initially, a little reflection reveals a conceptual muddle. What is needed in such cases is an analysis that provides a coherent conceptual framework within which a policy for action. (Moor 1985, p.266) Moor said that computer technology is genuinely revolutionary because it is “logically malleable”: According to Moor, the computer revolution occurs in two stages. 1. The first stage is that of “technological introduction” in which computer technology is developed and refined. This already occurred during the first 40 years after the second world war. 2. The second stage – one that the industrialized world has only recently entered – is that of “technological permeation” in which technology gets integrated into everyday human activities and into social institutions, changing the very meaning of fundamental concepts, such as “money,” “education,” “work,” and “fair elections.” Moor’s way of defining computer ethics is very powerful and suggestive. It is broad enough to be compatible with a wide range of philosophical theories and methodologies, and it is rooted in a perceptive understanding of how technological revolutions proceed. Moor argues that computer ethics is unique because computers have certain properties that raise unique issues and, according to Moor there are three properties that make computers a special case: IMPACT ON SOCIETY The extensive impact of computerization on society is clear. Naturally, in 1985, when wrote his paper, relatively few could foresee the extent of that impact, nor did anyone envisage the internet and the world wide web. Moor did, however, foresee the changing workplace, and the nature of work: “ Computer have been used for years by business to expedite routine work, such as calculating payrolls. However, as personal computers become widespread and allow executives to work at home, as robots do more and more factory work, the emerging question will not be merely how well do computers help us work? But what is the nature of this work?” INVISIBLE FACTOR An important fact about computers is that most of the time, and under most conditions, computer operations are invisible. Moor identifies three kinds of invisibility that can be have ethical significance: 1. Invisible Abuse: Moor describes this as: “the intentional use of the invisible operations of a computer to engage in unethical conduct.” He cites an examples: The programmer who realized he could steal excess from a bank. When interest on a bank account is calculated, there is often a fraction of a cent left over after rounding off. This programmer instructed a computer to deposit these fractions of a cent to his own account. The invasion of the property and privacy of others, computers can be programmed to surreptitiously remove or alter confidential information. 2. Invisible programming values: these are values which, according to Moor, are embedded into a computer program: Example: A programmer makes some value judgments about what is important and what is not. These values become embedded in the final product and may be invisible to someone who runs the program. 3. Invisible complex calculation: In this context, Moor writes: Computer today are capable of enormous calculations beyond human comprehension. Even if a program is understood, it does not follow that the respective calculations are understood. Computers today perform... calculations which are too complex for human inspection and understanding. He argues that the issue is how much should trust computer’s invisible calculation. This become a significant issue as the consequences grow in importance. For example: Computers are used by the military in making decisions about launching nuclear weapons. On the one hand, computers are fallible and there may not be time to confirm their assessment of the situation. On the other hand, making decisions about launching nuclear weapons without using computers may be even more fallible and more dangerous. What should be our policy about trusting invisible calculation? THREE LEVELS OF COMPUTER ETHICS Computer ethics questions can be raised and studied at various “levels.” And each level is vital to the overall goal of protecting and advancing human values. On the most basic level, computer ethics tries to sensitize people to the fact that computer technology has social and ethical consequences. 1. This is the overall goal of what some call “pop” computer ethics. Newspapers, magazines and TV news programs have engaged increasingly in computer ethics of this sort. Every week, there are news stories about computer viruses, or software ownership law suits, or computerized weapons, etc. As the social impact of information technology grows, such articles will proliferate. That’s good! The public at large should be sensitized to the fact that computer technology can threaten human values as well as advance them. The second “level” of computer ethics can be called “para” computer ethics. Someone who takes a special interest in computer ethics cases, collects examples, clarifies them, looks for similarities and differences, reads related works, attends relevant, and so on, is learning “para” computer ethics. By analogy with a para medic – who is not a physician, but who does have some technical medical knowledge – a “para” computer ethicist is not a professional ethicist, but does have some relevant special knowledge. A para medic, of course, cannot do all that a physician does, but he or she can make preliminary medical assessments, administer first aid and provide rudimentary medical assistance. Similarly, a “para” computer ethicist does not attempt to apply the tools and procedures of a professional philosopher or lawyer or social scientist. Rather, he or she makes preliminary assessment and identifications of computer ethics cases, compares them with others, suggest possible analyses. The third level of computer ethics I call “theoretical” computers ethics, because it applies scholarly theories to computer ethics cases and concepts. Someone proficient in “theoretical” computer ethics would be able not only to identify, clarify, compare and contrast computer ethics cases; she or he could also apply theories and tools from philosophy, social science in order to deepen our understanding of the issues. Such “theoretical” computer ethics is normally taught in college- level courses with titles like “computer ethics” computers and society,” “computers and the law.” Many computer professionals are Software Engineers or members of software engineering teams. Gotterbarn (2001) believes that because Software Engineers and their teams are responsible for developing safety-critical systems, they have significant opportunities to:  Do good or cause harm  Enable others to do good or cause harm  Influence others to do good or cause harm Thus, Gotterbarn suggest that the roles and responsibilities involved in the development of safety-critical software applications typically include:  Aircraft and Air Traffic Control System  Mass Transportation System  Nuclear Reactors  Missile System  Medical Treatment System SOCIAL NETWORKING SITES The Philippines is still the Social Capital of the World. Filipinos are using social media platforms 53 hours a week. That’s a whole 11 hours more than the global average of 42 hours! In a global study called wave 7, Filipinos are using Social Media to primarily connect with their families living overseas. As of this writing, there are more than 11 million Filipinos living outside the Philippines. Social media has become a way for them to communicate with their families and friends instead of using overseas call and text, which are the traditional ways of communication. Philippines is the Social Media Capital. As proof, Makati City takes the most selfies than anywhere in the world. As internet penetration increases in the Philippines, it seems that Filipinos have grown fond of using apps such as Wechat, Line, Skype, and Facebook Messenger. Line has a free call services. I use skype to call my friends abroad. With social media, the barrier to communications between families separated by countries have diminished, and only the country’s total social activity has increased. SOCIAL METWORKING ETHICAL ISSUES Obviously if we have hundreds of millions of users of one social networking site, it will be almost impossible that ALL of these users will abide by the golden rule. We, Filipinos, are very good in turning our national problems into joke expressed in a picture message published in social networking sites For instance, when the MRT-3 train that was derailed in Taft Avenue station, a netizen was quick to express in one of his picture message, “BUTI NA LANG NANDYAN SI SPIDEY”, depicting a scene from the movie “spider-man 2.” Another good illustration if after the airport brawl incident between Mon Tulfo and the Santiagos. A netizen post the following picture depicting the move the AVENGERS. POSTING A PICTURE MESSAGE The above pictures may be just fine because it is entertaining. But, what if your friends post your picture which, to your mind should not be seen by others, will that be OK with you? Hence, as a rule of thumb, netizens should NOT post a picture which may be offensive to some person(s) included in the picture. Of course, if the picture is on its face, a good picture, we do not need to get the consent of everyone. If we asked someone to join us in a photo shoot (or selfie), do we need to ask his permission to allow us to upload the said picture on any social networking site? Not anymore. This is due to the fact that once you ask someone popular, say, Manny Pacquiao, to join us in a photo shoot, he is aware that we are going to upload the same picture in our facebook and other social networking sites. The only exemption is when he (Manny Pacquiao) will expressly prohibit us from uploading the same to the internet. His mere silence is tantamount to an implied consent. However, if we take a photo or video of a private person without his consent, it is NOT proper to publish the same in the internet subject to some exemptions. To illustrate, supposed you fell asleep inside the library and one of your classmates take a picture of you and posted it in his Facebook; of course you will get furious. The act of your classmate is unethical and improper. EXEMPTIONS: 1. If the taking of a picture or video involves news of the day and other miscellaneous facts having the character of mere items of press information. Example is the videotaping of a man who jumped from the bridge in EDSA. 2. If the unauthorized picture taking and/or videotaping is done for the general welfare of the public. Here a video showed an abusive traffic enforcer who threatened the life of a truck driver. Because of this viral video, the abusive traffic enforcer was immediately suspended by the Office of the Vice Mayor Isko Moreno. 3. Taking a picture of public personalities in public. Example: So, if you will take a picture of Manny Pacquiao as shown in the picture, that will be fine. However, if, Manny Pacquiao went to the comfort room, never take his picture or video! QUESTIONS? ASSESSMENT TASKS #3, #4 & #5 GET SHORT BOND PAPER. USE THE GIVEN FORMAT READ THE SITUATION & ANSWER THE GIVEN QUESTIONS.

Use Quizgecko on...
Browser
Browser