© 2012 by Vaclav Rajlich 16 Related topics Software assumed a central role –it should contribute to the society’s well-being –should not be a growing threat.

Slides:



Advertisements
Similar presentations
Evaluation at NRCan: Information for Program Managers Strategic Evaluation Division Science & Policy Integration July 2012.
Advertisements

Cost Management ACCOUNTING AND CONTROL
Ethics and Social Responsibility
Chapter 1 Introduction.
1.04 -THE LAW- System of Rules
Ashutosh Pednekar, FCA, CISA, ISA (ICA), LLB (Gen), B.Com. Partner, M P Chitale & Co. November 6, 2007 IRDA – ICAI Round Table Meeting on Insurance Industry.
The Implementation Structure DG AGRI, October 2005
TEN-T Info Day for AP and MAP Calls 2012 EVALUATION PROCESS AND AWARD CRITERIA Anna Livieratou-Toll TEN-T Executive Agency Senior Policy & Programme Coordinator.
0 - 0.
Project Appraisal Module 5 Session 6.
1 According to PETROSAFE safety policy, the company is keen that: Introduction All Egyptian Petroleum companies and foreign companies working in A.R.E.
GUEST SERVICES GUIDE (c) Marin Management, Inc Revenue Management Guest Services Management Guide A. The Purpose of This Policy The management.
Niagara Portal Introduction January 2007 Scott Muench - Technical Sales Manager.
1 Whats All This Fuss About Promotion & Tenure? Sandra Burge, Ph.D. Dept. Family & Community Medicine Sandra Burge, Ph.D. Dept. Family & Community Medicine.
Program Update and Site Redesign Program Update and Site Redesign | Aug 2013.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Adult Education Directors Meeting March, 2012 Reno.
AfriMAP’s The Justice Sector and the Rule of Law in Namibia
WELCOME to the Presentations on Academic Project
The Office Procedures and Technology
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Analytical Frameworks
Page 1 October 31, 2000 An Introduction to Large-Scale Software Development Steve Varnau Core HP-UX Operation October 31, 2000.
Lecture 1: Introduction to Software Engineering CSC301 – Winter 2011
Strategy Review Meeting Strategy Review Meeting
Addition 1’s to 20.
1 CH 11: Looking at the Past and Across Cultures pp
10-1 © Prentice Hall, 2004 Chapter 10: Selecting the Best Alternative Design Strategy Plus Project Management Concepts.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
ATA Practice Guidelines for Video- based Online Mental Health Services “The guidelines pertain to telemental health conducted between two parties, and.
PROJECT MANAGEMENT ETHICS
Chapter 1- Ethics Lecture 2.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Software Engineering Code Of Ethics And Professional Practice
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
SE 112 Slide 1 SE 112 l
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Ethics Lecture Dr. Christina Howe
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Introduction to Computer Science
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Commonwealth of Massachusetts Statewide Strategic IT Consolidation (ITC) Initiative ANF IT Consolidation Website Publishing / IA Working Group Kickoff.
Ch. 101 Epilogue. Ch. 102 Outline What will be the future of the field? What is the impact of SE on society? What ethical issues are raised by SE?
S OFTWARE E NGINEERING C ODE O F E THICS A ND P ROFESSIONAL P RACTICE Software Engineering Ethics and Professional Practices © 1999 by the Institute of.
CISB 412 Social and Professional Issues Professional Ethics.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
1 Chapter Nine Engineering Your Career. 2 Engineering Careers  Electrical and computer engineers find employment in: 1.Private industry. 2.Government.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 1 Slide 1 Professional and ethical responsibility l Software engineering involves wider.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
Teamplay Connect, compare, collaborate.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Do software developers have an ethical duty? KELLEN STUART.
Professional Ethics and Responsibilities Part-II
1 A Mature Profession Of Software Engineering A Mature Profession Of Software Engineering Ye Yint Win EC Member (Myanmar Computer Scientist Association)
School of Business Administration Chap 3 Engineering of Software;

Add video notes to lecture
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Bill Tomlinson Art and computing Effects of computer-based art on society? (e.g. animation) Effects of participatory experiences on group dynamics.
Code of Ethics - History
Presentation transcript:

© 2012 by Vaclav Rajlich 16 Related topics Software assumed a central role –it should contribute to the society’s well-being –should not be a growing threat Software engineers are at the center of this significant social development –should think about the big picture and be well versed in ethical issues. 1

© 2012 by Vaclav Rajlich Computer crime Glaring example of professional ethics failure –variants of theft or vandalism Computer forensics –gathering evidence that is needed for criminal convictions –intersection between software engineering and criminal justice 2

© 2012 by Vaclav Rajlich Computer Ethics Codes Some people think software needs a brand new form of ethics Responsibility of software engineers is a classical responsibility between one person to another –present in human society through the ages Natural law is a conceptual ethical framework –can serve as the foundation of the conduct 3

© 2012 by Vaclav Rajlich Professional groups They developed more specific guidelines Example of medicine –Hippocratic oath Software engineering (ACM/IEEE) –Software engineering code of ethics and professional practice 4

© 2012 by Vaclav Rajlich Software engineering code of ethics - excerpt 1. Software engineers shall act consistently with the public interest. 2. Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest. 3. Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 5

© 2012 by Vaclav Rajlich Information Diversion and Misuse The novel capabilities of computers amplify numerous ethical issues Diversion and misuse of information –computers have a capability to collect information on an unprecedented scale –to process this huge amount of information through data mining algorithms. Information may end up in the wrong hands 6

© 2012 by Vaclav Rajlich Confidentiality Privacy and confidentiality rights –rooted in natural law Hippocratic oath – “Whatever I see or hear in the lives of my patients, whether in connection with my professional practice or not, which ought not to be spoken of outside, I will keep secret, as considering all such things to be private.” 7

© 2012 by Vaclav Rajlich Protecting confidentiality Individuals must have the right to consent how to use information about them –right to know the collected information, correct it, and even to withdraw it from the database, –customers can withdraw their name and phone number from the phone book Software engineers should be vigilant about this threat and monitor how their projects observe confidentiality. 8

© 2012 by Vaclav Rajlich Threat to freedom Society that allows diversion of the information will find its freedom under serious attack –Big Brother (government) who knows more about you then yourself –private snooping agencies (activists) with some petty agenda focused on your every move and thought Unfortunately within technological reach 9

© 2012 by Vaclav Rajlich Software management Business schools Operations management Business law Human resources management Accounting and finance Marketing and sales Economics, quantitative analysis Business policy and strategy 10

© 2012 by Vaclav Rajlich Process management Quality and predictability of processes Standards –ISO 9000 –Capability Maturity Model (CMM) Organizations that certify compliance Customers frequently require certification 11

© 2012 by Vaclav Rajlich Product management Scope of the product Readiness for the release Cost and profitability Collaborate with the sales department and monitor relations with the users. Quality management –reject low quality commits, baselines, versions 12

© 2012 by Vaclav Rajlich Ergonomics (human factors) Optimal height of chairs … Cognitive issues –complexity –learning the systems 13

© 2012 by Vaclav Rajlich Marketing personas Aggregate users into groups based on their goals and habits Personas get names, fake vitas 14

© 2012 by Vaclav Rajlich Example personas Institutional Repository (IR) Centralized archive at a University Alternative mode of publishing Professor Charles Williams –humanities –posts teaching materials –concerned with technical difficulties of IR 15

© 2012 by Vaclav Rajlich Personas (2) Rahul Singh –graduate student –spends most of his time in the lab –uses the IR to identify collaborators. Professor Anne Chao –has her own web site and a blog –active in the traditional scholarly publications 16

© 2012 by Vaclav Rajlich Personas (3) Julia Fisher –starting her graduate studies –active in various social events –her source of professional information and scholarly references is almost exclusively Internet –IR is a part of her strategy how to get relevant information and how to publish her early results. 17