Ethics Mid Course
Ethics Mid Course
Ethics Mid Course
Professional ethics are standards set by professional organizations for the behavior and values of
people working within a specific field.
It is advised that all professionals must be able to demonstrate that they act with integrity. They
shall be honest, straightforward and trustworthy in all their dealings. Professional shall be
conveying appropriate and necessary information in a way that is understandable to the recipient.
Confidential information shall not be divulged to unintended receivers at the same time they have
to be open and transparent to the concerned parties in all their works. A professional shall act
impartially, without any bias and in the event of any conflicting interest or any potential conflict of
interest; the same shall be informed to the relevant parties. Public interests need to be taken care
prior to making any decisions and a professional shall not accept a gift if it may create an improper
obligation.
A professional shall always provide the best possible service within the context of scope of
engagement. They should clearly understand the employer’s requirements. An efficient and
effective communication system shall be in place. Always try to provide a fair and reasonable
treatment.
Not only the professional life but the activities in personal life of a professional are also equally
important. Always try to keep promises; do what is said and say only what can be done.
Treat others with courtesy, politeness, consideration and respect immaterial of their race, religion,
size, age, gender, disability, country of origin, cultural differences etc. Never discriminate against
anyone for whatever reason. Always try to provide a fair and respectful treatment as part of
business culture.
A professional shall be accountable for all their actions; they have to take responsibility whether it
is right or wrong. They are supposed to act with skill, care and diligence. A proper Complaints
handling mechanism shall be established and all the complaints are to be attended to and resolved
in a constructive and professional manner.
What is professionalism?
Professionalism describes how you conduct yourself when you're at work so that you represent
both yourself and your organization positively. In many workplaces, the leadership outlines the
expectations for behavior and appearance of the staff. Part of being professional is adhering to
these requirements. It's also about embodying professional characteristics and the values of your
organization so that you're a good representative and role model.
Comparison chart
Ethics Morals
What are The rules of conduct recognized in Principles or habits with respect to right or
they? respect to a particular class of human wrong conduct. While morals also
actions or a particular group or culture. prescribe dos and don'ts, morality is
ultimately a personal compass of right and
wrong.
Why we do Because society says it is the right Because we believe in something being
it? thing to do. right or wrong.
Flexibility Ethics are dependent on others for Usually consistent, although can change if
definition. They tend to be consistent an individual’s beliefs change.
within a certain context, but can vary
between contexts.
The "Gray" A person strictly following Ethical A Moral Person although perhaps bound
Principles may not have any Morals at by a higher covenant, may choose to
all. Likewise, one could violate Ethical follow a code of ethics as it would apply to
Principles within a given system of a system. "Make it fit"
rules in order to maintain Moral
integrity.
Ethics versus Morals comparison chart
Ethics Morals
Klaus Mueller
What are the key tenets of four different codes of ethics that
provide guidance for IT professionals?
Legal perspective
• IT workers are not recognized as professionals
• not licensed
• IT workers are not liable for malpractice
Professional Codes of Ethics
Vendor certifications
• Cisco, IBM, Microsoft, etc.
• some certifications substantially improve IT workers’ salaries and
career prospects
• relevant for narrowly defined roles
- or certain aspects of broader roles
• require passing a written exam
• workers are commonly recertified as newer technologies become
available
Certification: Industry Association Certifications
Negligence:
• not doing something that a reasonable man would do, or doing
something that a reasonable man would not do
Duty of care:
• the obligation to protect people against any unreasonable harm or
risk
Software piracy
• copying work software for use at home (even when doing some
work at home) is considered piracy
The Code is designed to inspire and guide the ethical conduct of all computing
professionals, including current and aspiring practitioners, instructors, students,
influencers, and anyone who uses computing technology in an impactful way.
Section 1 outlines fundamental ethical principles that form the basis for the remainder of
the Code. Section 2 addresses additional, more specific considerations of professional
responsibility. Section 3 guides individuals who have a leadership role, whether in the
workplace or in a volunteer professional capacity. Commitment to ethical conduct is
required of every ACM member, ACM SIG member, ACM award recipient, and ACM
SIG award recipient. Principles involving compliance with the Code are given in Section
4.
This principle, which concerns the quality of life of all people, affirms an obligation of
computing professionals, both individually and collectively, to use their skills for the
benefit of society, its members, and the environment surrounding them. This obligation
includes promoting fundamental human rights and protecting each individual's right to
autonomy. An essential aim of computing professionals is to minimize negative
consequences of computing, including threats to health, safety, personal security, and
privacy. When the interests of multiple groups conflict, the needs of those less
advantaged should be given increased attention and priority.
Computing professionals should consider whether the results of their efforts will respect
diversity, will be used in socially responsible ways, will meet social needs, and will be
broadly accessible. They are encouraged to actively contribute to society by engaging in
pro bono or volunteer work that benefits the public good.
Well-intended actions, including those that accomplish assigned duties, may lead to
harm. When that harm is unintended, those responsible are obliged to undo or mitigate
the harm as much as possible. Avoiding harm begins with careful consideration of
potential impacts on all those affected by decisions. When harm is an intentional part of
the system, those responsible are obligated to ensure that the harm is ethically justified.
In either case, ensure that all harm is minimized.
Computing professionals should be honest about their qualifications, and about any
limitations in their competence to complete a task. Computing professionals should be
forthright about any circumstances that might lead to either real or perceived conflicts of
interest or otherwise tend to undermine the independence of their judgment.
Furthermore, commitments should be honored.
The values of equality, tolerance, respect for others, and justice govern this principle.
Fairness requires that even careful decision processes provide some avenue for
redress of grievances.
Computing professionals should foster fair participation of all people, including those of
underrepresented groups. Prejudicial discrimination on the basis of age, color, disability,
ethnicity, family status, gender identity, labor union membership, military status,
nationality, race, religion or belief, sex, sexual orientation, or any other inappropriate
factor is an explicit violation of the Code. Harassment, including sexual harassment,
bullying, and other abuses of power and authority, is a form of discrimination that,
amongst other harms, limits fair access to the virtual and physical spaces where such
harassment takes place.
The use of information and technology may cause new, or enhance existing, inequities.
Technologies and practices should be as inclusive and accessible as possible and
computing professionals should take action to avoid creating systems or technologies
that disenfranchise or oppress people. Failure to design for inclusiveness and
accessibility may constitute unfair discrimination.
1.5 Respect the work required to produce new ideas, inventions, creative
works, and computing artifacts.
Developing new ideas, inventions, creative works, and computing artifacts creates value
for society, and those who expend this effort should expect to gain value from their
work. Computing professionals should therefore credit the creators of ideas, inventions,
work, and artifacts, and respect copyrights, patents, trade secrets, license agreements,
and other methods of protecting authors' works.
1. PUBLIC – Software engineers shall act consistently with the public interest.
2. CLIENT AND EMPLOYER – Software engineers shall act in a manner that is in the
best interests of their client and employer consistent with the public interest.
3. PRODUCT – Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible.
6. PROFESSION – Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest.
8. SELF – Software engineers shall participate in lifelong learning regarding the practice
of their profession and shall promote an ethical approach to the practice of the
profession.
Professional Ethics and
Responsibilities
CSE 312 – Legal, Social, and Ethical Issues in
Information Systems
Stony Brook University
http://www.cs.stonybrook.edu/~cse312
1
Ch 9: Professional Ethics and Responsibilities
9.1 What Is “Professional Ethics”?
9.2 Ethical Guidelines for Computer Professionals
9.2.1 Special Aspects of Professional Ethics
9.2.2 Professional Codes of Ethics
9.2.3 Guidelines and Professional Responsibilities
9.3 Scenarios
9.3.1 Introduction and Methodology
9.3.2 Protecting Personal Data
9.3.3 Designing an Email System With Targeted Ads
9.3.4 Webcams in School Laptops
9.3.5 Publishing Security Vulnerabilities
9.3.6 Specifications
9.3.7 Schedule Pressures
9.3.8 Software License Violation
9.3.9 Going Public
9.3.10 Release of Personal Information
9.3.11 Conflict of Interest
9.3.12 Kickbacks and Disclosure
9.3.13 A Test Plan
9.3.14 Artificial Intelligence and Sentencing Criminals
2 9.3.15 A Gracious Host (c) Paul Fodor (CS Stony Brook) and Pearson
9.1. What is "Professional Ethics"?
Professional ethics includes relationships with and responsibilities toward
customers, clients, coworkers, employees, employers, others who use
one’s products and services, and others whom they affect
A professional has a responsibility to act ethically.
Lapses in ethics in many professional fields
A famed and respected researcher published falsified stem cell research
and claimed accomplishments he had not achieved
A writer invented dramatic events in what he promoted as a factual
memoir of his experiences
Many professions have a code of ethics that professionals are expected to
abide by
Medical doctors must decide how to set priorities for organ transplant
recipients.
Lawyers and judges
3
Accountants
(c) Paul Fodor (CS Stony Brook) and Pearson
What is "Professional Ethics"?
Computer professional issues:
How much risk (to privacy, security, safety) is acceptable in a system?
What uses of another company’s intellectual property are acceptable?
Honesty is one of the most fundamental ethical values; however,
many ethical problems are more subtle than the choice of being
honest or dishonest
Some ethical issues are controversial
4
(c) Paul Fodor (CS Stony Brook) and Pearson
9.2 Ethical Guidelines for Computer
Professionals
Special Aspects of Professional Ethics
A professional is an expert in a field
Customers rely on the knowledge, expertise, and honesty of the
professional
The products of many professionals (e.g., highway bridges,
investment advice, surgery protocols, and computer systems)
profoundly affect large numbers of people
A computer professional’s work can affect the life, health, finances,
freedom, and future of a client or members of the public
A professional can cause great harm through dishonesty, carelessness, or
incompetence
The victims have little ability to protect themselves; they are not the direct
customers of the professional and have no direct control or decision making role in
choosing the product or making decisions about its quality and safety
5
(c) Paul Fodor (CS Stony Brook) and Pearson
Ethical Guidelines for Computer Professionals
Software Engineering Code of Ethics and
Professional Practice
http://www.acm.org/about/se-code
ACM Code of Ethics and Professional
Conduct
https://www.acm.org/about-acm/acm-
code-of-ethics-and-professional-conduct
6
(c) Paul Fodor (CS Stony Brook) and Pearson
Ethical Guidelines for Computer Professionals
Special Aspects of Professional Ethics
Professionals must maintain up to date skills and knowledge
Because of the complexity, risks, and impact of computer
systems, a professional has an ethical responsibility not simply
to avoid intentional evil, but to exercise a high degree of care
and follow good professional practices to reduce the
likelihood of problems
A responsibility to maintain an expected level of competence
and be up to date on current knowledge, technology, and
standards of the profession
7
(c) Paul Fodor (CS Stony Brook) and Pearson
Ethical Guidelines for Computer Professionals
Professional Codes of Ethics
Many professional organizations have codes of professional
conduct
Provide a general statement of ethical values and remind
people in the profession that ethical behavior is an essential
part of their job
Provide valuable guidance for new or young members of the
profession who want to behave ethically but do not know
what is expected of them
Remind people in the profession that ethical behavior is an
essential part of their job
8
(c) Paul Fodor (CS Stony Brook) and Pearson
Ethical Guidelines for Computer Professionals
Guidelines and Professional Responsibilities
Developers and institutional users of computer systems must
view the system’s role and their responsibility in a wide enough
context
Include users (such as medical staff, technicians, pilots, office
workers) in the design and testing stages to provide safe and
useful systems
A system for a newborn nursery at a hospital rounded each
baby’s weight to the nearest pound.
For premature babies, the difference of a few ounces is crucial
information
Do a thorough, careful job when planning and scheduling a
project and when writing bids or contracts
allocate sufficient time and budget for testing
9
(c) Paul Fodor (CS Stony Brook) and Pearson
9.3 Scenarios
Introduction and Methodology
We look for ways to reduce negative
consequences
1. Brainstorming phase
List all the people and organizations affected (the
stakeholders)
List risks, issues, problems, and consequences
List benefits. Identify who gets each benefit
In cases where there is no simple yes or no decision,
but rather one has to choose some action, list possible
actions
40
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Introduction and Methodology
2. Analysis phase
Identify responsibilities of the decision maker
Identify rights of stakeholders
Consider the impact of the options on the
stakeholders (consequences, risks, benefits, harms,
costs)
Categorize each potential action as ethically
obligatory, prohibited, or acceptable
When there are multiple options, select one,
considering the ethical merits of each, courtesy to
others, practicality, self-interest, personal
41
preferences, etc.
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 1: Protecting Personal Data
Your customer is a community clinic that works with families with
problems of family violence.
It has three sites in the same city, including a shelter for battered women
and children.
The director wants a computerized record and appointment system,
networked for the three sites.
She wants a few laptop computers on which staffers can carry records
when they visit clients at home and stay in touch with clients by email.
She asked about an app for staffers’ smartphones by which they could
access records at social service agencies.
At the shelter, staffers use only first names for clients, but the records
contain last names and forwarding addresses of women who have recently
left.
42
The clinic’s budget is small.
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 2: Email System With Targeted Ads
Your company is developing a free email service
that will include targeted advertising based on
the content of the email messages (similar to
Google’s Gmail).
You are part of the team designing the system.
What are your ethical responsibilities?
46
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 2: Email System With Targeted Ads
Protect the email!
No humans will read the messages
Informed consent
Do not target based on sensitive topics, such as
mortgage foreclosures, health, and religion, then the
records the system stores will not have information
about those subjects
The designers should consider restrictions on the set
of topics the system uses for targeting
47
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 3: Webcams in School Laptops
As part of your responsibilities, you oversee the
installation of software packages for large orders.
A recent order of laptops for a local school
district requires webcam software to be loaded.
You know that this software allows for remote
activation of the webcam.
48
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 4: Publishing Security Vulnerabilities
Three MIT students planned to present a paper at a
security conference describing security vulnerabilities
in Boston’s transit fare system.
At the request of the transit authority, a judge ordered
the students to cancel the presentation and not to
distribute their research.
The students are debating whether they should
circulate their paper on the Web.
Imagine that you are one of the students.
51
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 6: Schedule Pressures – Safety-critical
Your team is working on a computer-controlled device for
treating cancerous tumors.
The computer controls direction, intensity, and timing of a
beam that destroys the tumor.
Various delays have put the project behind schedule, and the
deadline is approaching.
There will not be time to complete all the planned testing.
The system has been functioning properly in the routine
treatment scenarios tested so far.
You are the project manager, and you are considering whether
to deliver the system on time, while continuing testing and
56 making patches if the team finds bugs.
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 8: Software License Violation
Your company has 25 licenses for a computer program, but you discover
that it has been copied onto 80 computers.
The first step here is to inform your supervisor that the copies violate the
license agreement
If you are the person who signed the license agreements, they you are
obligated to honor it.
The name on the license could expose you to legal risk, or unethical
managers in your company could make you a scapegoat.
Report the violation or quit your job and have your name removed from
the license to protect yourself.
60
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 9: Going Public
Suppose you are a member of a team working on a computer-controlled
crash avoidance system for automobiles.
You think the system has a flaw that could endanger people.
The project manager does not seem concerned and expects to announce
completion of the project soon.
Do you have an ethical obligation to do something?
Given the potential consequences, yes
try talking with higher ups
If they don't agree, then an option is going outside the company to the customer, to
the news media, or to a government agency
"If there is something that ought to be corrected inside an organization, the most effective way to do
it is to do it within the organization and exhaust all possibilities there . . . you might have to go to
the extreme of publishing these things, but you should never start that way"
61
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 10: Release of Personal Information
You work for the IRS, the Social Security Administration, a movie-rental
company, or an Internet service provider.
Someone asks you to get a copy of records about a particular person.
He will pay you $500.
62
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 11: Conflict of Interest
You have a small consulting business.
The CyberStuff company plans to buy software to run a cloud data-
storage business.
CyberStuff wants to hire you to evaluate bids from vendors.
Your spouse works for NetWorkx and did most of the work in writing the
bid that NetWorkx plans to submit.
You read the bid while your spouse was working on it and you think it is
excellent.
Do you tell CyberStuff about your spouse’s connection with NetWorkx?
63
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 12: Kickbacks and Disclosure
You are an administrator at a major university.
Your department selects a few brands of security software to recommend
to students for their desktop computers, laptops, tablets, and other
devices.
One of the companies whose software you will evaluate takes you out to
dinner, gives you free software (in addition to the security software),
offers to pay your expenses to attend a professional conference on
computer security, and offers to give the university a percentage of the
price for every student who buys its security package.
64
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 13: A Test Plan
A team of programmers is developing a communications system for
firefighters to use when fighting a fire.
Firefighters will be able to communicate with each other, with supervisors
near the scene, and with other emergency personnel.
The programmers will test the system in a field near the company office.
65
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 14: Artificial Intelligence and Sentencing
You are part of a team developing a sophisticated program using artificial
intelligence techniques to help judges make sentencing decisions for
convicted criminals.
66
(c) Paul Fodor (CS Stony Brook) and Pearson
Scenarios
Scenario 15: A Gracious Host
You are the computer system administrator for a mid-sized company.
You can monitor the company network from home, and you frequently
work from home.
Your niece, a college student, is visiting for a week.
She asks to use your computer to check her email.
Sure, you say.
68
(c) Paul Fodor (CS Stony Brook) and Pearson
privacy principles
The spirit of the GDPR comes to life in the six privacy principles underlying the law.
What are these highly-prized principles and how do they impact your business? Keep
reading to find out.
The GDPR presents six privacy principles that help place the rules and repercussions in
context.
Registering your copyright with the Copyright Office is a good idea for legal purposes.
Rights Granted by a Copyright
A copyright grants you specific rights in terms of your software. When you hold the
copyright to software code, you can:
Systems
Functions
Solutions to computer problems
You can use two types of patents to protect software: utility and design. Utility protects
what the software does. Design protects any decorative part of your software.
Unlike copyright law, patent law protects the invention itself. That way, someone can't
create a software program with different code that does the exact same thing your software
does. But the patent doesn't protect your specific lines of code against plagiarism the way
copyright does.
Things to Consider Before Applying for a Patent
Patents last for 20 years after the day you receive the patent. Then the work goes
into Public Domain.
If you patent solving a specific problem, you might block other programmers from
solving the problem in a different way.
Getting a patent can take as long as two years.
Filing with the U.S. Patent and Trademark Office (USPTO) can cost $1,000 to
$3,000.
Protecting Software as a Trade Secret
A trade secret is information you or your company has that other people don't have. You
use this information in business, and it gives you a leg-up over your competition.
You don't file any documents or apply with an office to get a trade secret. Instead, the way
you treat your software can make it a trade secret. You have to take "reasonable measures"
to keep the software a secret:
You can maintain a trade secret for as long as you want. Unless someone discovers your
secret by what the law calls "fair means," your trade secret will last forever. If someone else
discovers, on their own, a trade secret similar to yours, you can't take legal action.
Sometimes companies and individuals don't see trade secrets as secure enough protection
for valuable software inventions.
Intellectual Property issues
Plagiarism
Plagiarism is using the work of others as though it were your own. This seems like an issue related
mainly to school, but the text lists examples from news reporting and movie making that show plagiarism
can occur in the real world as well.
The text points out a common misunderstanding that could explain some instances of plagiarism. Some
people seem to believe that anything posted on the Internet is public domain and subject to free use.
Those beliefs are not correct, but even if they were, that would not excuse pretending that something
made by someone else is your own work. It is unclear to me why the author presents a list of five web
based companies that provide comparison services to teachers concerned about plagiarism. Those
services are certainly geared to one market, and they are unlikely to be of much use to anyone outside a
school system.
Reverse Engineering
The concept here is to examine something that works (like a software program), determine how it works,
and make a copy or improved version of it. This is perfectly legal if you own the original, and
quite illegal if you do not.
For those who have not worked in the software business, the example in the text may not be clear.
Assume, for example, that we have a client database saved in a proprietary format that we purchase
annually from a legitimate source. We use a database program that a contractor wrote for us to
manipulate the data. Assume that the vendor changed data file format this year, and it is only available in
the new format. The original contractor is long gone. We need someone to determine what the original
program did, and find a way to write a program that will do the same or better with the new data source.
The person who does this needs to reverse engineer the original program. Doing so will save a great
deal of time in many cases. This is legal if we paid the original programmer for his work and his product:
we own the right to do so.
To legally compete with the product of another vendor, we must create our product without knowledge of
the code in their product. Think about it this way: if you are a magician, and you see another magician
perform an act that is new and impressive, you can go two ways. The legal, ethical way is to look at the
effect, and to figure out how to do something like it or better with your own skills and knowledge. That is
what a good magician (and a good programmer) would do. The illegal, unethical way would be
to steal the secret of the effect from the performer you saw (or from knowledgeable staff). This is what
a thief would do. A third way would be to copy the code into your program, or copy the whole program
and sell it as your own. This is what a pirate would do. (Although I am not convinced that Morgan and
Bartholomew would approve.)
Some computer programs are not protected by copyright. They are meant to be shared and adapted by
other programmers who will in turn share their work with anyone willing to comply with the requirement to
continue the open source agreement.
The text offers some examples of open source code products that are available for download on page
257. Remember that open source code products are typically free, but that is not the salient factor. They
are open source code products because any programmer may attempt to improve the product as long as
they comply with the requirement to keep the product open. In most cases, this means that updates are
submitted as proposals, which would then be approved or disapproved, and then made a part of the
ongoing product (or not).
Competitive Intelligence
If you research a competitor through public records, news releases, public relations articles, web
sites, and other readily available sources, you can form opinions about what the competitor is doing and
what you should do to compete more effectively. This is an example of using competitive intelligence.
There is nothing wrong with this practice.
If, on the othe hand, you try to steal trade secrets, you interview their staff under false pretenses (are
there true pretenses?), you hire people to work for the competitor to get information, and otherwise try to
get insider information about the competitor, you are conducting industrial espionage, which is illegal.
The text offers a list of diagnostic questions on page 259 that can help you understand the difference. A
way to summarize the difference in behavior might be to ask whether you would want the police to know
what you are doing. If the issue makes no sense to you because it is only about soap (see the Procter
and Gamble example in the text), remember that it is not about state secrets, it is
about unlawful practices that translate to money in the marketplace.
Cyber squatting
The chapter ends with a discussion about people who register domain names with the hope that they will
be able to sell the rights to the domain to a company that wants the rights enough to pay for them. A
domain name can be considered as an intellectual property in that it is not real property, but it may be
close enough to a trademark, service mark, or company name to serve as an asset to a company. This
technique may backfire on a squatter who wants too much for the domain, or who is trying to get a payoff
from a company who wishes to take the squatter to court to force a
Crime and Internet
Financial fraud occurs when someone uses the internet to steal money or
deprive others of their assets.
Digital piracy, often known as online piracy, is the act of downloading and sharing
digital copyrighted content without permission.
Money laundering is the practice of using the internet to transfer funds through
various online payment methods.
The Electronic Transactions Ordinance (ETO), which was enacted in 2002, was the first
IT-related legislation. It was an important first step in ensuring the legal sanctity and
security of the local e-commerce sector.
Pakistan’s cybercrime law covers the following eight major aspects of the e-commerce
industry:
In 2016, the Prevention of Electronic Crimes Act (PECA) was passed. It provides a
comprehensive framework for all forms of cybercrime and is based on the Cyber Crime
Bill of 2007.