We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byGiana Pyle
Modified over 2 years ago
© 2012 by Vaclav Rajlich 16 Related topics Software assumed a central role –it should contribute to the society’s well-being –should not be a growing threat Software engineers are at the center of this significant social development –should think about the big picture and be well versed in ethical issues. 1
© 2012 by Vaclav Rajlich Computer crime Glaring example of professional ethics failure –variants of theft or vandalism Computer forensics –gathering evidence that is needed for criminal convictions –intersection between software engineering and criminal justice 2
© 2012 by Vaclav Rajlich Computer Ethics Codes Some people think software needs a brand new form of ethics Responsibility of software engineers is a classical responsibility between one person to another –present in human society through the ages Natural law is a conceptual ethical framework –can serve as the foundation of the conduct 3
© 2012 by Vaclav Rajlich Professional groups They developed more specific guidelines Example of medicine –Hippocratic oath Software engineering (ACM/IEEE) –Software engineering code of ethics and professional practice 4
© 2012 by Vaclav Rajlich Software engineering code of ethics - excerpt 1. Software engineers shall act consistently with the public interest. 2. Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest. 3. Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 5
© 2012 by Vaclav Rajlich Information Diversion and Misuse The novel capabilities of computers amplify numerous ethical issues Diversion and misuse of information –computers have a capability to collect information on an unprecedented scale –to process this huge amount of information through data mining algorithms. Information may end up in the wrong hands 6
© 2012 by Vaclav Rajlich Confidentiality Privacy and confidentiality rights –rooted in natural law Hippocratic oath – “Whatever I see or hear in the lives of my patients, whether in connection with my professional practice or not, which ought not to be spoken of outside, I will keep secret, as considering all such things to be private.” 7
© 2012 by Vaclav Rajlich Protecting confidentiality Individuals must have the right to consent how to use information about them –right to know the collected information, correct it, and even to withdraw it from the database, –customers can withdraw their name and phone number from the phone book Software engineers should be vigilant about this threat and monitor how their projects observe confidentiality. 8
© 2012 by Vaclav Rajlich Threat to freedom Society that allows diversion of the information will find its freedom under serious attack –Big Brother (government) who knows more about you then yourself –private snooping agencies (activists) with some petty agenda focused on your every move and thought Unfortunately within technological reach 9
© 2012 by Vaclav Rajlich Software management Business schools Operations management Business law Human resources management Accounting and finance Marketing and sales Economics, quantitative analysis Business policy and strategy 10
© 2012 by Vaclav Rajlich Process management Quality and predictability of processes Standards –ISO 9000 –Capability Maturity Model (CMM) Organizations that certify compliance Customers frequently require certification 11
© 2012 by Vaclav Rajlich Product management Scope of the product Readiness for the release Cost and profitability Collaborate with the sales department and monitor relations with the users. Quality management –reject low quality commits, baselines, versions 12
© 2012 by Vaclav Rajlich Ergonomics (human factors) Optimal height of chairs … Cognitive issues –complexity –learning the systems 13
© 2012 by Vaclav Rajlich Marketing personas Aggregate users into groups based on their goals and habits Personas get names, fake vitas 14
© 2012 by Vaclav Rajlich Example personas Institutional Repository (IR) Centralized archive at a University Alternative mode of publishing Professor Charles Williams –humanities –posts teaching materials –concerned with technical difficulties of IR 15
© 2012 by Vaclav Rajlich Personas (2) Rahul Singh –graduate student –spends most of his time in the lab –uses the IR to identify collaborators. Professor Anne Chao –has her own web site and a blog –active in the traditional scholarly publications 16
© 2012 by Vaclav Rajlich Personas (3) Julia Fisher –starting her graduate studies –active in various social events –her source of professional information and scholarly references is almost exclusively Internet –IR is a part of her strategy how to get relevant information and how to publish her early results. 17
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Chapter 1- Ethics Lecture 2.
PROJECT MANAGEMENT ETHICS
Introduction to Computer Science
Computer Ethics Overview Gordon College. Introduction Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
0 - 0.
1.04 -THE LAW- System of Rules
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Ch. 101 Epilogue. Ch. 102 Outline What will be the future of the field? What is the impact of SE on society? What ethical issues are raised by SE?
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
AfriMAP’s The Justice Sector and the Rule of Law in Namibia
SE 112 Slide 1 SE 112 l
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Privacy & Security By Martin Perez. Introduction Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
Lecture 1: Introduction to Software Engineering CSC301 – Winter 2011
Do software developers have an ethical duty? KELLEN STUART.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
1 A Mature Profession Of Software Engineering A Mature Profession Of Software Engineering Ye Yint Win EC Member (Myanmar Computer Scientist Association)
Ashutosh Pednekar, FCA, CISA, ISA (ICA), LLB (Gen), B.Com. Partner, M P Chitale & Co. November 6, 2007 IRDA – ICAI Round Table Meeting on Insurance Industry.
Ethics Lecture Dr. Christina Howe
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 1 Slide 1 Professional and ethical responsibility l Software engineering involves wider.
Software Engineering Code Of Ethics And Professional Practice
Strategy Review Meeting Strategy Review Meeting
OSE2 - 1 Introduction to Software Engineering Professional Issues SWENET OSE2 Module June 2003 Developed with support from the National Science Foundation.
1 Whats All This Fuss About Promotion & Tenure? Sandra Burge, Ph.D. Dept. Family & Community Medicine Sandra Burge, Ph.D. Dept. Family & Community Medicine.
1 According to PETROSAFE safety policy, the company is keen that: Introduction All Egyptian Petroleum companies and foreign companies working in A.R.E.
Ethics and Social Responsibility
Page 1 October 31, 2000 An Introduction to Large-Scale Software Development Steve Varnau Core HP-UX Operation October 31, 2000.
10-1 © Prentice Hall, 2004 Chapter 10: Selecting the Best Alternative Design Strategy Plus Project Management Concepts.
Addition 1’s to 20.
Professional Ethics? Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching,
Project Appraisal Module 5 Session 6.
WELCOME to the Presentations on Academic Project
TEN-T Info Day for AP and MAP Calls 2012 EVALUATION PROCESS AND AWARD CRITERIA Anna Livieratou-Toll TEN-T Executive Agency Senior Policy & Programme Coordinator.
Chapter 1 Introduction.
Niagara Portal Introduction January 2007 Scott Muench - Technical Sales Manager.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 An Introduction to Software Engineering.
Research Seminars in IT in Education (MIT6003) Research Methodology II Dr Jacky Pow.
Test B, 100 Subtraction Facts
Information Technology as a Profession
Mississippi Special Education Advisory Panel Annual Report to the State Board of Education July 2009.
© 2017 SlidePlayer.com Inc. All rights reserved.