Ethical Challenges for Information Systems Professionals PDF

Document Details

SpectacularOnyx4220

Uploaded by SpectacularOnyx4220

National University

Patrick Nicole C. Ramos

Tags

ethical challenges information systems software engineering professional ethics

Summary

This presentation covers ethical challenges for information systems professionals. It details learning outcomes, various IT careers, and a code of ethics for software engineers. The document also highlights case scenarios and explores the concept of whistle-blowing.

Full Transcript

WEEK: 12 LESSON TITLE : Ethical Challenges for Information Systems Professionals TOPIC PRESENTED BY: PATRICK NICOLE C. RAMOS Learning Outcomes At the end of the lesson, the student is expected to: Determine how the computer-related careers stack up. Explain the Principles formulated by...

WEEK: 12 LESSON TITLE : Ethical Challenges for Information Systems Professionals TOPIC PRESENTED BY: PATRICK NICOLE C. RAMOS Learning Outcomes At the end of the lesson, the student is expected to: Determine how the computer-related careers stack up. Explain the Principles formulated by the Association of Computing Machinery in dealings with other people, decision-making, in software design and all other dealings in the exercise of the IT profession. Apply the code of ethics in a work scenario of a software engineer. Computer-Related Careers Some of the Computer-Related Professions: Web Developer Software developer Software engineer System Analyst Database Administrator Information Security Analyst Data Scientist Computing Profession How well-developed are the computing professions? Characteristics of a Fully Developed Profession Computer-Related Careers How do computer-related careers stack up? Certification and licensing - allow a profession to determine who will be allowed to practice the profession. For example, a person may not practice law in a state without passing the bar exam and being granted a license. In contrast, computer-related professionals can practice their career even without being certified or having been granted a license. Computer-Related Careers How do computer-related careers stack up? supporting the The two largest organizations computing field are: IEEE Computer Society (IEEE-CS) VISION: “To be the leading provider of technical information, community services, and personalized services to the world’s computing professionals.” Association for Computing Machinery (ACM) VISION: “ACM will continue to be the premiere global computing society.” Computer-Related Careers How do computer-related careers stack up? In 1993 the IEEE-CS and ACM set up a joint steering committee to explore the establishment of software engineering as a profession. 3 Task Forces Created: 1st – conducted a survey of practitioners with the goal of understanding the knowledge and skills required by software engineers. 2nd – developed accreditation criteria for undergraduate programs in software engineering. 3rd – developed a code of ethics for software engineers Software Engineers Code of Ethics Who are the software engineers? A software engineer is someone engaged in the development or maintenance of software, or someone who teaches in this area. Software Engineers Code of Ethics ABILITY TO HARM PUBLIC Computer profession has the ability to harm members of the public through the design, implementations and maintenance of computer hardware and software system. For example, Therac-25 killed or gravely injured at least six people, in part because of defective software. It is a computer-controlled radiation therapy machine produced by Atomic Energy of Canada Limited (AECL) in 1982. https://ethicsunwrapped.utexas.edu/case-study/therac-25 Software Engineers Code of Ethics Software Engineers Code of Ethics Check this in the book: pages 413 – 421 ETHICS FOR THE INFORMATION AGE By Michael Quinn Software Engineers Code of Ethics CODE OF ETHICS 8 PRINCIPLES: PRINCIPLE 1: PUBLIC Software engineers shall approve software only if they have a well- founded belief that it is safe, meets specifications, passes appropriate tests, and does not diminish quality of life, diminish privacy, or harm the environment. The ultimate effect of the work should (clause be to the public good. 1.03) Software Engineers Code of Ethics CODE OF ETHICS 8 PRINCIPLES: PRINCIPLE 2: CLIENT AND EMPLOYER Software engineers shall not knowingly use software that is obtained or retained either illegally or unethically. (clause 2.02). Software Engineers Code of Ethics CODE OF ETHICS 8 PRINCIPLES: PRINCIPLE 3: PRODUCT Software engineers shall ensure proper and achievable goals and objectives for any project on which they work or propose. (clause 3.02) Software Engineers Code of Ethics CODE OF ETHICS 8 PRINCIPLES: PRINCIPLE 4: JUDGMENT Software engineers shall maintain integrity and independence in their professional judgment. Software Engineers Code of Ethics CODE OF ETHICS 8 PRINCIPLES: PRINCIPLE 5: MANAGEMENT Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. Software Engineers Code of Ethics CODE OF ETHICS 8 PRINCIPLES: PRINCIPLE 6: PROFESSION Software engineers shall advance the integrity and reputation of the profession consistent with the public interest. Software engineers shall help develop an organizational environment favourable to acting ethically. (clause 6.01) Software Engineers Code of Ethics CODE OF ETHICS 8 PRINCIPLES: PRINCIPLE 7: COLLEAGUES Software engineers shall be fair to and supportive of their colleagues. Software Engineers Code of Ethics CODE OF ETHICS 8 PRINCIPLES: PRINCIPLE 8: SELF Software engineers shall continually endeavor to improve their ability to create safe, reliable, and useful quality software at reasonable cost and within a reasonable time. (clause 8.02) CASE SCENARIOS Case Scenario 1: Sam Shaw calls the Department of Computer Science at East Dakota State University seeking advice on how to improve the security of his business’s local area network. A secretary in the department routes Mr. Shaw’s call to Professor Jane Smith, an internationally recognized expert in the field. Professor Smith answers several questions posed by Mr. Shaw regarding network security. When Mr. Shaw asks Professor Smith to recommend a software package to identify security problems, Professor Smith tells him that NetCheks got the personal computer magazine’s top rating. She does not mention that the same magazine gave a “best buy” rating to another product with fewer features but a much lower price. She also fails to mention that NetCheks is a product of a spin-off company started by one of her former CASE SCENARIOS Case Scenario 1 Analysis: 1.08. Be encouraged to volunteer professional skills to good causes and contribute to public education concerning the discipline. 6.02. Promote public knowledge of software engineering. 1.06. Be fair and avoid deception in all statements, particularly public ones, concerning software or related documents, methods and tools. 4.05. Disclose to all concerned parties those conflicts of interest that cannot reasonably be avoided or escaped. 6.05. Not promote their own interest at the expense of the CASE SCENARIOS Case Scenario 2: Joe dela Cruz, a system administrator for a large corporation, is installing a new software package on the PC used by employee Chuck Flores. The company has not authorized Joe to read other people’s emails, Web logs, or personal files. However, in the course of installing the software, he accidentally comes across directories containing files with suspicious-looking names. He opens a few of the files and discovers they contain child pornography. Joe believes possessing such images is against federal law. What should he do? What ethical challenge Joe is facing right now? CASE SCENARIOS Case Scenario 2 Analysis: 3.13. Be careful to use only accurate data derived by ethical and lawful means, and use it only in ways properly authorized. 2.03.Use the property of a client or employer only in ways properly authorized, and with the client’s or employer’s knowledge and consent. 2.09. Promote no interest adverse to their employer or client, unless a higher ethical concern is being compromised; in that case, inform the employer or another appropriate authority of the ethical concern. 5.10. Provide for due process in hearing charges of violation of CASE SCENARIOS Case Scenario 3: The Internet is plagued by a new worm that infects PCs by exploiting a security hole in a popular operating system. Tim Smart creates an antiworm that exploits the same security hole to spread from PC to PC. When Tim’s antiworm gets into a PC, it automatically downloads a software patch that plugs the security hole. In other words, it fixes the PC so that it is no longer vulnerable to attacks via that security hole. Tim releases the antiworm, taking precautions to ensure that it cannot be traced back to him. The antiworm quickly spreads throughout the Internet, consuming large amounts of network bandwidth and entering millions of computers. To system administrators, it looks just like another worm, and they battle its spread the same way they fight all other worms. CASE SCENARIOS Case Scenario 3 Analysis: 1.08. Be encouraged to volunteer professional skills to good causes and contribute to public education concerning the discipline. 1.01. Accept full responsibility for their own work. 2.03.Use the property of a client or employer only in ways properly authorized, and with the client’s or employer’s knowledge and consent. CASE SCENARIOS Case Scenario 3 Analysis: 8.01. Further their knowledge of developments in the analysis, specification, design, development, maintenance, and testing of software and related documents, together with the management of the development process. 8.02. Improve their ability to create safe, reliable, and useful quality software at reasonable cost and within a reasonable time. 8.06. Improve their knowledge of this Code, its interpretations and its application to their work. CASE SCENARIOS Check this: https://www.youtube.com/watch?v=CKvw_2D4v54 Whistle Blowing A whistle-blower is a person working within an organization who reports that organization’s misconduct. The person can be a present or past employee. Misconduct can be: A past act Ongoing In the planning stages Whistle Blowing Two Types of Whistle Blowing: 1. Internal Whistle Blowing – the whistle blower reports misconduct to another person within the organization. 2. External Whistle Blowing – the whistle blower reports misconduct to a person outside the organization, such as law enforcement or the media. Whistle Blowing "Whistleblower 2 Protection Act of 2019." AN ACT PROVIDING FOR THE PROTECTION, SECURITY, AND BENEFITS OF WHISTLEBLOWERS, APPROPRIATING FUNDS THEREFOR, AND FOR OTHER PURPOSES Morality of Whistle Blowing Are whistle blowers heroes or traitors? WHISTLE-BLOWERS CAUSE HARM Disloyalty to the company Bad publicity to the company Disrupt the social fabric of an organization Make it more difficult for everyone to work as part of a team Morality of Whistle Blowing WHISTLE-BLOWING IS A SIGN OF ORGANIZATIONAL FAILURE Careers of accused managers can be ruined It makes people suspicious of one another, eroding team spirit. Organizations need to find a way to prevent it from happening in the first place. Morality of Whistle Blowing WHISTLE-BLOWING AS A MORAL DUTY Whistle-blowing is alluded to in clauses 1.02, 1.03, 1.04, 1.05, 2.05, 2.09, 3.01, 6.06, and 6.13 of the Software Engineering Code of Ethics and Professional Practice. Moral responsibility is not exclusive. Performance Task #4 A SKIT - GROUP VIDEO PRESENTATION Topic: Ethical Challenges for Information Systems Professionals Each group will create a 6 to 8-minute skit showing an example of an ethical scenario that may happen in an IT workplace. Consider the setting, characters, dialogues and the message you aim to convey. At the end of the video, for at least 2 minutes, evaluate the decisions made by the characters and examine how they deal with the situation using the PRINCIPLES in the Code of Ethics for Software Engineers. “Across professions, consistency is a direct product of work ethic.” – Harsha Bhogle Reference 1. https://www.acm.org/ 2. https://www.computer.org/ 3. https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.cartoonstock.com%2Fdir ectory%2Fm%2Fmoral_reasoning.asp&psig=AOvVaw2ntTVg6iJseHqomtSYZwoM&ust=1 716787955358000&source=images&cd=vfe&opi=89978449&ved=0CBIQjhxqFwoTCPD 79tPLqoYDFQAAAAAdAAAAABAD 4. https://s3.amazonaws.com/lowres.cartoonstock.com/computers-computer_algorithm-al gorithms-business_problems-programming-problem_solving-aban569_low.jpg 5. https://study.com/learn/lesson/what-is-a-whistleblower-ethics-law-examples-of-the-whis tleblower-protection-act.html 6. http://www.senate.gov.ph/lisdata/1301611690!.pdf 7. Quinn, Michael J. (2013) Ethics for the Information Age

Use Quizgecko on...
Browser
Browser