Ict652 (Chapter 1-8)
Ict652 (Chapter 1-8)
INTRODUCTION
Historical Overview of Computer
Ethics
The Pace of Change
► 1940s: First computer was built.
► 1956: First hard-drive disk weighed a ton and stored five
megabytes.
► 1991: Space shuttle had a one-megahertz computer. Ten
years later, some automobiles had 100-megahertz
computers. Speeds of several gigahertz are now common.
Change and Unexpected Developments
Cell Phones
► Relatively few in 1990s. Approximately five billion
worldwide in 2011.
► Used for conversations and messaging, but also for:
► taking and sharing pictures
► watching videos
► checking email and playing games
► finding maps, etc
► What smartphone apps do we have for:
► Muslims?
► Students?
Change and Unexpected Developments
Issues with cell phones:
► PRIVACY: location tracking, camera
► Cell phones can interfere with solitude, quiet and
concentration.
► Talking on cell phones while driving is dangerous.
► Other unanticipated negative applications: terrorists
detonating bombs, rioters organizing looting parties.
Change and Unexpected Developments
Kill switches
► Allow a remote entity to disable applications and delete
files.
► Are in operating systems for smartphones, tablets and
some computers.
► Used mainly for security, but raise concerns about user
autonomy.
Change and Unexpected Developments
Social Media or Social Networking:
► First online social networking site was classmates.com in
1995.
► Founded in 2003, Myspace had roughly 100 million
member profiles by 2006.
► Facebook was started at Harvard as an online version of
student directories
► Twitter was founded in 2006
► microblogging and social networking service
► Instagram was launched in October 2010
► photo and video-sharing owned by Facebook, Inc.
Change and Unexpected Developments
Social Media or Social Networking (cont.):
► Businesses connect with customers.
► Organizations seek donations.
► Groups organize volunteers.
► Protesters organize demonstrations and revolutions.
► Individuals pool resources through “crowd funding”.
Change and Unexpected Developments
Social Media issues:
► Stalkers
► Cyber-bully
► Jurors tweet about court cases during trials.
► Socialbots simulate humans.
► Fake info / fake news
► Fake accounts
► Many more….
Change and Unexpected Developments
Communication and the Web
► In the 1980s, email messages were short and contained
only text.
► People worldwide still use email, but texting, tweeting ,
and other social media are now preferred.
► Blogs (“Web log”) began as outlets for amateurs wanting
to express ideas, but they have become significant source
of news and entertainment.
► Inexpensive video cameras and video-manipulation tools
have resulted in a burst of amateur videos.
► Many videos on the Web can infringe copyrights owned by
entertainment companies.
Change and Unexpected Developments
Telemedicine
► the practice of caring for patients remotely when the
provider and patient are not physically present with each
other.
► performance of medical exams and procedures, including
surgery.
► Examples:
► Patient consultations via video conferencing,
► e-health (including patient portals),
► remote monitoring of vital signs,
► nursing call centers,
Change and Unexpected Developments
E-commerce
► Amazon.com started in 1994 selling books on the Web.
It has grown to be one of the most popular, reliable,
and user-friendly commercial sites.
► eBay.com facilitates online auctions.
► Shopee
► Lazada
► Zalora
► Traditional brick-and-mortar businesses have also
established web sites for their company.
Change and Unexpected Developments
E-commerce and trust concerns
► When people sell stuffs on social media, how do you
decide that this seller is trustworthy?
► Profile picture?
► Language? Bagi salam, etc?
► Testimonials?
► Reviews
Change and Unexpected Developments
► Collaboration
► Wikipedia: The online, collaborative encyclopedia
written by volunteers.
►Edit war
► Informalcommunities of programmers create and
maintain free software.
► Watch-dogs on the Web: Informal, decentralized groups
of people help investigate crimes.
►Controversial: emotionally involved
Change and Unexpected Developments
Free stuff
► Examples:
► Emailaccounts, browsers, software for viewing
documents, software to edit photos and videos etc.
► Phone services using VOIP such as Skype, Whatsapp
► University lectures
► In order for companies to earn ad revenue, many free
sites collect information about our online activities and
sell it to advertisers.
► Free games, free apps. What do they get from it?
Change and Unexpected Developments
Free stuff (cont.)
► Advertising pays for many free sites and services, but not
all.
► Wikipedia funded through donations.
► Businesses provide some services for good public relations
and as a marketing tool.
► Generosity and public service flourish on the Web. Many
people share their expertise just because they want to.
Change and Unexpected Developments
Artificial Intelligence
► A branch of computer science that makes computers
perform tasks normally requiring human intelligence.
► Researchers realized that narrow, specialized skills were
easier for computers than what a five-year-old does:
recognize people, carry on a conversation, respond
intelligently to the environment.
► Many AI applications involve pattern recognition.
► Speech and face recognition is now a common tool.
Change and Unexpected Developments
Robots
► Mechanical devices that perform physical tasks
traditionally done by humans.
► Can operate in environments that are hazardous for
people.
► Robots could:
► inspect undersea structures and communication cables
► searchfor survivors in buildings collapsed by bombs or
earthquakes
► explore volcanoes and other planets
Change and Unexpected Developments
What is Ethics:
► Study of what it means to “do the right thing”.
► Assumes people are rational and make free choices.
► Rules to follow in our interactions and our actions that
affect others.
► Two different perspectives that ethics are:
► Fundamental like law of science
► Rules we make up like law of football
Ethics
A variety of ethical views (cont.):
► Negative rights (liberties)
► The right to act without interference
► Freedom of religion
► Freedom of assembly
► Freedom of speech
► Freedom of association
► Positive rights (claim-rights)
► An obligation of some people to provide certain things for
others
► E.g in Malaysia: Housing developers must provide
bumiputera quotas even if they don’t want to.
Ethics
A variety of ethical views (cont.):
► Golden rules
► Treat others as you would want them to treat you.
► Contributing to society
► Doing one’s work honestly, responsibly, ethically,
creatively, and well is virtuous.
► Social contracts and a theory of political justice
► People willingly submit to a common law in order to
live in a civil society.
Ethics
A variety of ethical views (cont.):
► No simple answers
► Human behavior and real human situations are
complex. There are often trade-offs to consider.
► Ethical theories help to identify important principles or
guidelines.
► Do organizations have ethics?
► Ultimately, it is individuals who are making decisions
and taking actions. We can hold both the individuals
and the organization responsible for their acts.
Ethics
Some important distinctions:
► Right, wrong, and okay
► Can’t divide all acts into right/wrong
► Distinguishing wrong and harm
► Harm: not necessarily mean unethical, E.g: Taxes
► Separating goals from constraints
► Goal: make profit, but within constraints
► Personal preference and ethics
► Can’t force others to think the same way
► Law and ethics
► What is lawful might not be ethical. Vice versa
Computer Ethics?
► Known as standard of professional practice, codes of
conducts, aspects of computer law, public policy, corporate
ethics even certain topics in sociology and psychology of
computing.
► The efforts of professional philosophers to apply traditional
ethical theories like utilitarianism, Kantianism, or virtue
ethics to issues regarding the use of computer technology.
► Computer ethics in the broadest sense can be understood as
that branch of applied ethics which studies and analyze such
social and ethical impacts of information technology
Historical Milestone in Computer Ethics
1960s
► In the mid 1960s, Donn Parker of Stanford Research
Institute (SRI) International in California began to examine
unethical and illegal uses of computers by computer
professionals.
► He published "Rules of Ethics in Information Processing" in
Communications of the ACM in 1968
► Parker headed the development of the first Code of
Professional Conduct for the Association for Computing
Machinery
Historical Milestone in Computer Ethics
1970s
► In late 1960s, Joseph Weizenbaum, a computer scientist
from MIT in Boston, created a computer program that he
called ELIZA
► In his first experiment with ELIZA, he scripted it to
provide a crude imitation of "a Rogerian psychotherapist
engaged in an initial interview with a patient“
► The results showed that how deep people emotionally
involved with the computer, sharing their intimate
thoughts with it.
Historical Milestone in Computer Ethics
1970s (cont.)
► In mid 1970s, Walter Maner, from Bowling Green State
University in Ohio began to use the term "computer ethics"
to refer to that field of inquiry dealing with ethical
problems aggravated, transformed or created by
computer technology.
► Maner generated much interest in university-level
computer ethics courses.
► He offered a variety of workshops and lectures at
conferences across America
► Many university courses were put in place because of him,
and several important scholars were attracted into the
field.
Historical Milestone in Computer Ethics
► By the 1980s, a number of social and ethical
consequences of information technology were becoming
public issues in America and Europe
► In the mid-80s, James Moor of Dartmouth College
published his influential article "What Is Computer Ethics?"
► In 1991 Bynum and Maner convened the first international
multidisciplinary conference on computer ethics, which
was seen by many as a major milestone of the field.
► It brought together, for the first time, philosophers,
computer professionals, sociologists, psychologists, lawyers,
business leaders, news reporters and government officials.
► It generated a set of monographs, video programs and
curriculum materials
Historical Milestone in Computer Ethics
1990s
► During the 1990s, new university courses, research
centers, conferences, journals, articles and textbooks
appeared, and a wide diversity of additional scholars and
topics became involved.
► Simon Rogerson of De Montfort University (UK),
established the Centre for Computing and Social
Responsibility
► The mid-1990s has heralded the beginning of a second
generation of Computer Ethics
Defining the Field Of Computer Ethics
► The second stage is "technological permeation"
► Technology gets integrated into everyday human activities
and into social institutions,
► Technology changes the meaning of fundamental concepts,
such as "money", "education", "work", and "fair elections".
► Computer ethics identifies and analyzes the impacts of
information technology upon human values
► E.g.:health, wealth, opportunity, freedom, democracy,
knowledge, privacy, security, self-fulfillment, and so on.
Defining the Field Of Computer Ethics
► According to Moor, the computer revolution is occurring in
two stages.
► The first stage was that of "technological introduction"
► Computer technology was developed and refined.
► This already occurred in America during the first forty years
after the Second World War.
ISLAMIC
PERSPECTIVES
Prepared By:
Zuhri Arafah Zulkifli
Muhammad Hafiz Khairuddin
Mohd Shukor Abd Rahman
Moral Theories Akhlaq Theories
Social System
Belief
2
"Ethical values in Islam:
Particular reference with
Prophet Muhammad s.a.w.
Mission".
3
4
Ethics in Islam
O Islam has a comprehensive perspective regarding the
ethical issues because the lawgiver for all systems,
including the ethical system, is Allah s.w.t, who knows
everything and what is best for all human beings.
5
Ethics from Islamic
Perspective
O Ethics is related to several Arabic terms
O ma‘ruf (approved),
O khayr (goodness),
O haqq (truth and right),
O birr (righteousness),
O qist (equity),
O ‘adl (equilibrium and justice), and
O taqwa (piety).
6
Islamic Sources
O In Islam, the Quran is the main course of judgment.
7
MORAL
8
Ethics vs Moral
O Ethics and morals both relate to “right” and “wrong”
conduct.
9
Morality
O The word “morality” comes from the Latin
word moralitas meaning “manner, character, and proper
behavior”
10
Standard of Judgment
in Islam
O This standard of judgment provides the nucleus around
which the whole moral conduct should revolve – whether
conduct is good or bad:
11
Basic Principles in Islamic
Morality
O The Islamic moral system stems from its primary creed of belief in One
God as the Creator and Sustainer of the Universe.
O Islam considers the human race to be a part of God’s creation, and as His
subjects.
O Quran and hadith, the main sources of Islam, attached great importance
to ethics.
O The Prophet Muhammad s.a.w. indicated that the main purpose Allah sent
him to the people is to improve their ethics.
He said: “I was sent only to perfect the moral excellence of human beings”
12
Basic Principles in Islamic
Morality
O The key to virtue and good conduct is a strong relation with
Allah.
O Islam enjoins moral behavior in all circumstances; Allah is aware
of each one when no one else is.
O It may be possible to deceive the world, but it’s not possible to
deceive the Creator.
O The love and continuous awareness of Allah and the Day of
Judgment enables man to be moral in conduct and sincere in
intentions, with devotion and dedication.
13
AKHLAQ
14
15
Definition
O Akhlaq (Arabic: أخالق) is an Arabic term referring to
the practice of virtue, morality and manners in
Islamic theology and philosophy.
O Akhlaq refers to character or customs
O Imam Al-Ghazali define akhlaq as a nature
character (internal) of human being, and willing to
express spontaneous action.
16
Definition (cont..)
O Akhlaq derives from the Arabic Khuluk means
behavior, customs, or believe. Akhlaq will
showing identity for an individual.
17
Akhlaq
O Akhlaq focus to goodness and badness, and will tell
us how we can practice it in our life, either with
Allah, human being, and environment.
O A Muslim is expected to be humble before Allah and
with other people.
O Islam also commands upon every Muslim to
exercise control of their passions and desires.
18
SOCIAL
SYSTEM
BELIEF
19
SOCIAL SYSTEM BELIEF
O Belief:
❑ Needs reason
❑ Arise through experience
20
O Belief System:
❑ structures of norms that are interrelated
❑ every human being has belief system to
make sense of the world
O It is shaped by:
religion
culture
experience
training
stereotypes
political viewpoints
etc
21
22
Social System of Islam
• Equality of Mankind
• Institution of the Family
• Relatives & Neighbours
23
Equality of Mankind
Wahai umat manusia! Sesungguhnya Kami telah
menciptakan kamu dari lelaki dan perempuan dan Kami
telah menjadikan kamu berbagai bangsa dan bersuku
puak, supaya kamu berkenal-kenalan (dan beramah mesra
antara satu dengan yang lain). Sesungguhnya semulia-
mulia kamu di sisi Allah ialah orang yang lebih takwanya di
antara kamu, (bukan yang lebih keturunan atau
bangsanya). Sesungguhnya Allah Maha Mengetahui, lagi
Maha Mendalam PengetahuanNya (akan keadaan dan
amalan kamu).
(Al Hujurat: 13)
24
Equality of Mankind
O Foundation of Islamic Social System
O The equality of all Muslims is emphasized
repeatedly throughout the Qur'an.
O Islam does not distinguish between two races,
or two groups of people, or between two
colours.
O Example, performing Umrah; Friday prayers
25
Institution of the Family
O The foremost and fundamental institution of human
society is the family unit
26
Institution of the Family
27
Institution of the Family
28
Relatives & Neighbors
O The Qur’an has divided them into three categories:
a neighbour who is also a relation; a neighbour who
is a stranger; and a casual or temporary neighbour
with whom one happens to live or travel for a
certain time
O All of them are deserving of sympathy, affection,
kindness and fair treatment.
29
Relatives & Neighbors
30
Relatives & Neighbors
O No one among you shall be a true believer unless he likes for
others what he likes for himself (Bukhari and Muslim).
31
VIEW/ISSUES
THAT RELATED TO
ISLAMIC PERSPECTIVES
FREE SPEECH
❖ Islam encourages the use of freedom of speech in upholding justice and preventing wrong-
doing.
❖ A muslim must speaks out against evil or bad deeds, give advise in order to stop the
wrongdoings and if needed report it to the authority.
❖ A muslim must put the interest of the religion first even faced with strong opposition.
FREE SPEECH
❖ There are few situations that a Muslim should be very
cautious in their speeches. Islam prohibits kind of
speeches that bring harm to others. The speeches are:
• Backbiting
• Defaming and Slandering
• Talebearing
BACK BITING
❖ Back biting is malicious talk about someone who is not present. Back biting is a form
slander in someone’s absence. Islam prohibits backbiting. A verse from the holy Quran on
the matter:
“O you who have believed, avoid much [negative] assumption.
Indeed, some assumption is sin. And do not spy or backbite each other.
Would one of you like to eat the flesh of his brother when dead?
You would detest it.
And fear Allah ; indeed, Allah is accepting of repentance and merciful” [3]
❖ A Muslim must not smear another Muslim reputation (except when ask authority e.g.
When ask in a court). Because being a Muslim, he cannot hurt his brother of faith. A good
Muslim is who check his speech and action against a fellow Muslim. An example of hadith
is presented below:
“A Muslim is the one from whose tongue and hands the Muslims are safe; and a
muhajir (emigrant) is the one who refrains from what Allah has forbidden“[4]
DEFAMING AND
SLANDERING
❖ Defame and slander is another exclusion the freedom of speech in Islam. Defame is
damaging a person or group by saying bad things about them in their presence.
❖ While slander is damaging a person or group by saying bad things about them in their
absence. In the religious context, a slander has an almost similar meaning to backbiting.
However, slander is about telling lies about someone behind his back while backbiting is
saying something hurtful about someone even if it is the truth, but the person does not
like it to be mention to someone else.
❖ Verses from the holy Quran about prohibition of Defaming and Slandering:
“"Woe to whoever defames (the presence) and slander (in absence), which
accumulates wealth and counts them forever; he thinks that his wealth will make
him eternal. No! Surely he will be released on ripper (hell)“[5]
TALEBEARING
❖Talebearing is an act bring into conflicts between brothers of faith by telling
something bad about one person to another person with the intent that the
listener does some harm to the person who is being bad-mouthed, and this
makes the person who is saying bad things happy. This is act is very harmful AS
the prophet SAW warned the talebearer:
Narrated hudhaifa:
I heard the prophet saying,
"A qattat (talebearer) will not enter paradise.“[6]
ISSUES ON
COMPUTER & WORK
Time Management
Our attitude towards time indicates our attitude towards the value of the capital
of life.
Capital of life here means TIME. We must ensure that our task is done on time,
follow the deadline and not procrastinating.
Technology advancement like social media would affect our task by too much
spending on them rather than finishing the task given.
Allah Says:
“I swear by the time. Most surely man is in loss. Except those who believe
and do good works, and exhort one another to accept truth, and exhort one another
to be steadfast”
(Surah Al- ’Asr, 103:1-3)
Honesty and Integrity
Integrity means that data cannot be modified without authorization.
“O believers, fear God, and be among those who are the truthful ones”
(Al-Tawbah 9:119)
Physical Surveillance
Computer-users face monitoring problems at their workplace for their use of
emails or the Internet.
“Indeed, Allah commands you to render trusts to whom they are due and when you
judge between people to judge with justice. Excellent is that which Allah instructs
you.
Indeed, Allah is ever Hearing and Seeing.”
(Al- Nisa 4:58)
COMPUTER CRIME
O In the today’s world, the form of crime has escalated through the use of
computer/cyber technology.
O Computer crime cases are usually in the form such as hacking, fraud,
theft and libel.
O All of the above is forbidden in Islam as it will cause harm or destruction.
O The Al-Quran stated:
“O you who believe! Do not enter houses other than your own, until you
have asked for permission, and greeted their occupants. That is better
for you; so that you may remember.”
(Al-Quran, 24:27)
O As you can see from this verse, Islam views theft very seriously and
punishes the perpetrator with a very severe punishment.
COMPUTER CRIME
O Islam views libel (fitnah) very seriously. The existence of social media
platform has made libel very easy to commit. Islam views libel is
worst than committing the sin of murder.
46
CHAPTER 3
3.1 PRIVACY AND PERSONAL INFO
WHAT IS PRIVACY?
Health
Relationship
Family
Medical information
Religious belief
Political view
IMPORTANCE OF PRIVACY
Safety
Security
PRIVACY THREAT IN SEVERAL CATEGORIES:
Theft of information.
Biometric technology
TERMINOLOGY AND PRINCIPLES FOR DATA
COLLECTION AND USE
Computer Matching
- Combining and comparing information from different
databases
- Used as identifier such as SSN to match records
Computer Profiling
- Analyzing data in computer files to determine
characteristics of people
- Businesses use this technique to grap new customer
PRIVACY PRINCIPLES FOR PERSONAL
INFORMATION
Inform people when personally identifiable info is
collected, what is collect and how it is used
Collect only the data needed
Medical records
Property ownership
Welfare record
Targeted marketing
Why business do marketing?
Find new customer
Encourage old one to continue
Online activity
People did not realize/expect the company would store and use
their information for other task. People often did not see,
ignore or did not understand the implication.
Personalized marketing
What people like about personalization
Recommendation based on prior purchase
Greeted by name after log in
What people don’t like about personalization
People feel manipulated
The private information might get leaked in ways that threaten
peoples privacy.
Risk
Who did not supposed to get this information?
Thieves, stalkers, divorced lawyer, nosy neighbors.
Storage of information of where a person location over
time.
This records of movement pose many threat to privacy, safety
and liberty
Ability to determine a person current location has risk
STOLEN AND LOST DATA
Criminal steals / uses the information
Buy the record
Hacking
Stealing
Spyware collects
Track web surfing
Credit card numbers
Data stolen is to be used in identity theft and
fraud
Government agency lost data as well
There is no law require government to inform people
who his/her personal data were stolen
Investigator and data brokers use pretexing process
to get information
Pretend to be someone with good reason to obtain the
data
Obtain customer data by lying and sell it to whoever
wants it is unethical.
Those who collect information has ethical
responsibility to protect them from misuse
Negative consequences
• Identity theft
• Destruction of reputation
• Personal safety risk
• Secondary uses of information
• Loss of social forgiveness
Solution
• Limiting what is posted online
• Adopting automation systems with edited
features.
• Restriction on access
NATIONAL ID SYSTEMS
Email :
USA PATRIOT act .
Enforcement agent to use pen-registry authority to get
destination and information for email.
Its allow them to get information about people`s email and
Internet use from ISP .
DESIGNING COMMUNICATION SYSTEMS
FOR INTERCEPTION
Comm Assistance for Law Enforcement Act ,
requires the telecommunication equipment be
designed to ensure that the government can
intercept telephone calls .
FBI requirement :
Interception of all wire and electronic comm .
Intercept simultaneously.
Identify physical location of cell phone users
Intercept of packet-mode communication on the
internet .
SECRET INTELLIGENCE GATHERING
National Security Agency
Collects and analyzes foreign intelligence information
related to U.S national security from others
Monitor communication between U.S and other
countries and a lot communication within other
countries .
ENCRYPTION POLICY
Purpose :
-The purpose is to provide guidance that limits the use
of encryption to those algorithms .
-To help ensure the security of data, and to protect
privacy, in national and global information and
communications infrastructures, networks and
systems;
CHAPTER 3: SOCIAL ISSUES IN IT
3.4 Risk of New Technology
3.5 Computer Errors and Failure
Content
• Risk of New Technology
• Computer Errors and Failure
• Safety - Critical Application
• Increasing Reliability and Safety
• Dependence, Risk and Progress
Risk
RELIABILITY SAFETY
Technique
• User interface and human factor
• Testing
• Redundancy and self checking
User interface and human factors
• Well designed user interfaces can help avoid many
computer-related problems.
• System designers and programmer need to learn
from pyschologist and human factor expert about:
▫ How user interact with the system interfaces
▫ How disable user interact with the system interfaces
▫ Does the different age user,interact with the system
differently.
• Example of failure in user interface:
▫ Crash of American Airlines Flight 965 near Cali,
Columbia, in 1995.
Redundancy and self-checking
• redundancy check - Is a system of checking for errors in
computer functioning
• Example:
▫ Space shuttle in the 1980s
▫ Used 4 indentical but independent computer system that received
input from multiple sensors and checked their result against each
other.
▫ If result from one of the computer is differ from each other.it was
taken out of service. If two of the remaining three judged the
third to be faulty,it was taken out of service, and the rest of the
flight canceled.
• Self checking - Is a system that checks and monitors itself for
errors.
• Even with best practices are followed, there is no guarantee
that such complex system are bug free.
Testing
• Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test.
• Software testing can also provide an objective, independent view of the
software to allow the business to appreciate and understand the risks of
software implementation
• There are several types of testing:
▫ Alpha
▫ Beta
▫ Functional and non-functional
testing
** non-functional testing (Baseline testing, Compliance testing,
Documentation testing, Endurance testing, Load testing, Localization
testing and Internationalization testing, Performance testing, Recovery
testing, Resilience testing, Security testing, Scalability testing, Stress
testing, Usability testing, Volume testing
Law, regulation & market
• To help consumer seek justice for havoc that
caused by errors and failures of the systems they
used.
Types of approach
• Warranty for consumer software
• Regulation & safety critical
application
• Professional licensing
• Civil penalties
• Warranty for consumer software
▫ Most retail consumer software comes with “shrink wrap” or “click on”
licensing agreements that indicate the consumer has buy the product.
▫ But there is no guarantee that it works corretcly.
▫ Some of the warranty agreement provides:
Prohibiting user from publically criticizing the software
Provisions that the vendor may choose the state in which legal disputes
are settled, possibly at great inconvenience to the consumer.
Legal protection for consumer for the product they purchased.
• Regulation and safety critical appliations
▫ Legislation or regulation that are created to prevent life-threatening
computer failures.
▫ Example:
Ban of the use of computer control for applications where an error could
be fatal.
• Professional licensing
▫ Another controversial approach to improving software
quality is to mandatory licensing of software
developments professional.
▫ Professional licensing requirement usually include
specific training, the passing of competency exams,
ethical requirement and continuing education.
▫ Desired effect:
To protect the public from poor quality and unethical
behavior.
• Taking responsibility
▫ Company or business that provide the system or
technology which is failed and damage the customer
pays the customer for the problems or damages.
▫ Good customer relations
ARE WE TOO DEPENDENT ON
COMPUTER?
• Debates about our dependence on computers has been
appears in many discussions of the social impact of
computers.
• Main point in the discussion about our dependece on
computers mainly : Is this good, bad or neutral.
• According to the website : www.debate.org, in their debates
about “Are we too dependent on computers?”. Resulted about
77% of the members agreed and 23% of the member disagree.
• Misconceptions about dependence on computers come from a
poor understanding of the:
▫ Role of risk
▫ Confusion of “dependence” with use
▫ Blaming computers for failures.
• Is the dependence on computers different from the
dependence on electricity? Or is dependence on computers
different from a farmer’s dependent on a plows.
• Computers and plows are tools, we use tools because we
better off with them than without them.
Risk and Progress
• Electricity lets us heat our homes, cook our food,
and enjoy security and entertainment.It also can kill
you if you’re not careful.(Energy notes).
• Most new technologies were not very safe when first
developed.
• As time progress, technologies improve to reduce
the risk
• Risk is not restricted to technology and machines.It
is part of life.
• Someone living in a jungle without any technology
also faces risk danger from animals.
Computers and Community
Content Outline:
• 4.1 Freedom of Speech
• 4.2 Changing Communication Paradigms
• 4.3 Censorship in Cyberspace
• 4.4 Computer and Community
• 4.5 The Digital Divide
4.1 Freedom Of Speech
“The Internet has been a revolution for censorship as much
as for free speech“ - Jo Glanville, editor of Index on
Censorship.
(Internet telah menjadi satu revolusi untuk penapisan sebanyak
mungkin kebebasan untuk bersuara)
FREEDOM OF SPEECH IN MALAYSIA
4.2 The changes in Communication
Paradigm
Print media
Broadcasting
Common
carrier
Eg:
monorail,
LRT, ERL
Regulation of Communication media
Common carrier
LAWS ON REGULATION OF
COMMUNICATION MEDIA
MEDIA CONTROL IN MALAYSIA
• Mainstream media in Malaysia is mainly
owned by political parties and heavily
regulated by government
• Censorship is applied to control media
content to avoid unnecessary disturbance to
the national security.
Should Internet be controlled by
the government as well?
4.3 Censorship in
Cyberspace
protect children
by reducing Need proof of
access to adult age from site
materials visitors
$100000 and
2 years in Limited than
Child
prison $50000 and six Development
unconstitutional month in jail Associated
(CDA)
Child Pornography
• Movies or pictures of child under 18 in sexual
positions or engaged in sexual acts.
• Considered as child abuse.
• Child Pornography Prevention Act extended the
law to include virtual children as well as other
images where real adults appear to be minors.
ALTERNATIVES
Censorship in Cyberspace
CASE 1
CASE 2
Censorship in Cyberspace
CASE 3
CASE 4
YAHOO!, FRENCH and OTHER NATION
censorship
Anonymity
• Anonymity vs. Community
– Supporters of anonymity:
• Say it is necessary to protect privacy and free speech.
– Opponents of anonymity:
• Believe it is anti-social and allows criminals to hide from law
enforcement.
– U.S. and European countries are working on laws that
require ISPs to maintain records of the true identity of
each user and maintain records of online activity for
potential use in criminal investigations
Protecting Access and Innovation
• Direct censorship is not the only factor to limit
the amount of information available on the
internet
• Sometimes laws and regulations are lobbied
by the large companies to restrict their
competition
Net neutrality
• Net neutrality is a principle that supports no restrictions by
Internet service providers or governments on consumers'
access to networks that participate in the Internet.
• It would prevent restrictions on content, sites, platforms,
types of equipment that may be attached, and modes of
communication.
• Network owners can't interfere with content, applications,
services, and devices of users' choice and remains open to
all users and uses
• Net neutrality in the common carrier sense has been
instantiated into law in many countries, including Malaysia
Net Neutrality : Control of Data
• Supporters of network neutrality want a legal
mandate ensuring that cable companies allow
Internet service providers (ISPs) free access to
cable lines and the model used for dial-up
Internet.
• To ensure that cable companies cannot
screen, interrupt or filter Internet content
without court order
Net Neutrality : Rights and Freedom
• Net neutrality ensures that the Internet
remains a free and open technology, fostering
democratic communication.
• Some opponents of net neutrality argue that
net neutrality is a violation of the property
rights of internet service providers because
they produce and own access to the Internet.
Deregulation
• Deregulation is the act or process of removing or
reducing state regulations
• Opposite of regulation
• Deregulation can be distinguished from
privatization
• Privatization is the process of transferring
ownership of a business, enterprise, agency,
public service or public property from the public
sector (a government) to the private sector,
either to a business that operate for a profit or to
a non-profit organization.
Forms of Privatization
• Share issue privatization (SIP) - selling shares on
the stock market
• Asset sale privatization - selling an entire
organization (or part of it) to a strategic investor,
usually by auction or by using the Treuhand
model
• Voucher privatization - distributing shares of
ownership to all citizens, usually for free or at a
very low price.
• Privatization from below - Start-up of new
private businesses in formerly socialist countries.
4.4 Computers and
• Community
It is human nature to form associations based on
common interests
Users of Computer and Internet
Spend less time with family Voracious consumer
on information
Early critics complained that telephone
replaced human interaction with
disembodied, remote voices….
HOWEVER!
Defined as “the gap between those individuals and communities that have,
and those who do not have, access to the information technologies that are
changing our lives rapidly”. Technology has become the driving force of
change in the world today.
Old View of Digital Divide
Focus on bridging the gap between poor people in rural areas and the rich
within the country.
New View of Digital Divide
Focus on bridging the gap between developed and poor countries.
• In order to reduce the Digital Divide..
Security
◦ Internet started with open access as a
means of sharing information for research
◦ Firewalls are used to monitor and filter out
communication from untrusted sites or
that fit a profile of suspicious activity
◦ Security is often playing catch-up to
hackers as new vulnerabilities are
discovered and exploited
The Law: Catching and Punishing Hackers (cont.):
1.Numbers of citizen
2.Numbers of computer or internet users
3.Users' awareness regarding cyber crime
Comparison between percentage of complaints or cases between
Malaysia and USA.
This is due to :
1.End users' awareness on cyber crime is more higher in USA than
in Malaysia.
2.The roles played by cyber security agency in USA is better than in
Malaysia.
3.Lack of cyber crimes researches in Malaysia than in USA.
4.The cyber technology in preventing and curbing cyber crimes in
the USA is more advanced than in Malaysia.
Fraud Analytical Tool
◦ Detect fraud early
◦ Identify the right claims to focus on
◦ Automate time-consuming processes
◦ Streamline workflow
◦ Quickly identify suspicious participants or patterns in
claims.
Hacking Analytical Tool
◦ sense and detect suspicious/doubtful applications which
are able to leak private information / financial settlement /
company’s secret.
Fraud detection tools:
◦ Fraud.net Guardian
◦ Splunk – for e-commerce purposes - protect customers
and reputation, and avoid fraud-related costs
◦ FICO – Fraud Management System
◦ Fractals - Class-leading integrated, intelligent fraud
detection and prevention framework for payment card
issuers and acquirers.
Hack detection tools
◦ NetPatrol
◦ sXe Injected
◦ SMS – smishing hacking detector
Search and Seizure of Computers:
Requires a warrant to search and seize a computer
Automated searches
Charges are generally filed where the crime occurs
Laws differ between states and countries
The FBI usually files in the state where the crime was
discovered and the investigation began
Purpose: to foster international cooperation
among law agencies at different countries to
fight cybercrime
When Digital Actions Cross Borders:
Laws vary from country to country
Corporations that do business in multiple
countries must comply with the laws of all the
countries involved
Someone whose actions are legal in their own
country may face prosecution in another
country where their actions are illegal
A Russian citizen was arrested for violating
the DMCA when he visited the U.S. to present
a paper at a conference; his software was not
illegal in Russia (hacking adobe e-books)
An executive of a British online gambling site
was arrested as he transferred planes in
Dallas (online sports betting is not illegal in
Britain)
Digital Signature Act 1997
Copyright (Amendment ) Act 1997
Telemedicine Act 1997
Computer Crimes Act 1997
Communications & Multimedia Act (CMA)
1998
Information Technology Act 2000
The Induce Act
(http://www.mycert.org.my/en/services/stati
stic/mycert
http://www.scribd.com/doc/71214912/Cybe
r-Crime-in-Malaysia-and-USA
A gift of fire
ITS 610
Ethical, Social, And Professional
Issues
Chapter 7:
“IT Ownership”
Content Outline:
• 7.1 - Intellectual Property and Changing
Technology
• 7.2 – Intellectual Property Laws
• 7.3 – Search Engine and Online Libraries
• 7.4 – Fair-Use Doctrine
• 7.5 – International Piracy
• 7.6 – Analytical Tools in Plagiarism
Intellectual Property
Property
• means possession or something to which the
owner has the rights.
Intellectual Property
• The intangible creative work, not its particular
physical form
• Value of intelligence and artistic work comes
from creativity, ideas, research, skills, labor,
non-material efforts and attributes the creator
provides
• Protected by copyright and patent law.
Intellectual Property
• Copyright holders have exclusive rights:
– To make copies
– To produce derivative works, such as translations into
other languages or movies based on books
– To distribute copies
– To perform the work in public (e.g. music, plays)
– To display the work in public (e.g. artwork, movies,
computer games, video on a Web site)
World Intellectual Property
Organization ( WIPO )
http://www.myipo.gov.my/perundangan
Fair Use Doctrine
• Fair use is a limitation and exception to the exclusive
right granted by copyright law to the author of a creative
work. In US copyright law, fair use is a doctrine that permits
limited use of copyrighted material without acquiring
permission from the rights holders.
• Examples of fair use include commentary, search engines,
criticism, news reporting, research, teaching, library archiving
and scholarship. It provides for the legal, unlicensed citation
or incorporation of copyrighted material in another author's
work under a four-factor balancing test.
Fair Use Doctrine
• term fair use originated in the United States.
• Four factors considered
– Purpose and nature of use – commercial (less
likely) or non-profit purposes
– Nature of the copyrighted work
– Amount of significance or portion used
– Effect of use on potential market or value of the
copyright work (will it reduce sales of work?)
• No single factor alone determines
• Not all factors given equal weight, varies by
circumstance
Fair Use Doctrine
• Producers or creators of parodies of a copyrighted work have
been sued for infringement by the targets of their ridicule,
even though such use may be protected as fair use.
• These fair use cases distinguish between parodies (using a
work in order to poke fun at or comment on the work itself)
and satires (using a work to poke fun at or comment on
something else - the use of humor, irony, exaggeration, or
ridicule to expose and criticize people's stupidity or vices,
particularly in the context of contemporary politics and other
topical issues. – e.g: Caricature).
• Courts have been more willing to grant fair use protections to
parodies than to satires, but the ultimate outcome in either
circumstance will turn on the application of the four fair use
factors.
Scenarios of Fair Use
• A student uses a picture of a frog that she found through a Google search for her
Power Point presentation in her Introduction to Biology class.
2
3
Invention Innovation
creation of a product improves on or makes
or introduction of a a significant
process for the first contribution to
time something that has
already been invented
*Thomas
Edison *Steve Jobs
Source: Business Insider
4
Produce new goods previously unknown for customers.
5
Innovators need to defend
their innovation
6
1. Innovations are new to a community.
Are we assuming a new community will react similarly to a community that
is currently using the technology?
being introduced.
6. Features matter.
How to accommodate the stakeholder’s needs in the design of the
8
Communication (definition)
Imparting, conveying or exchange of ideas, knowledge,
information, etc. (whether by speech, writing or signs).
Communication paradigm
A pattern or model that allows people to
communicate to another person in order to give
information about people needs and desires.
10
11
12
1. Community and Isolation
Many observers worry that the impact of computers on community,
social and interpersonal interaction is negative and will get worse.
Some fear that the use of computers in schools will have negative
effects on children and ultimately society.
spending more time working alone with the machine
social skills may not develop as well as they would without computers
The formation of electronic relationships with people scattered
around the country and the world may further weaken local
communities
Aadhar project
19
2001 earthquake in Gujarat causes thousands of people to lose their
home and properties.
India created Aadhar project with the objective to provide its people
with biometric ID
20
India also work with other countries in The India Innovation
Growth Programme that is designed to accelerate innovative
India technologies into global markets.
Gary Coleman ;
Managing Director, Global Industries, of Deloitte Touche Tohmatsu Limited
24
CHINA
25
Government failed to protect intellectual property rights.
The existence of an Apple store that sells replication of Apple
products
Strict hierarchy
Education system that are too focused on test scores
Discrimination towards merchants
Imitation over innovation
Now, China is making a breakthrough in B2C & B2B sectors. (eg: Alibaba.
Below are some of the reasons:
Deeply
understanding Retaining local
Chinese talent
customers
Instilling a
Promoting
culture of risk
collaboration
taking
Source: McKinsey & Co. 26
United States of America
27
WESTERN CULTURE
Innovation Disruptive
START interest innovation
Fosters Actively
“Creative entrepreneurs
encourage
destruction” hip and risk
taking innovation
28
Innovation interest veer towards incremental change & efficiencies.
29
Creative destruction drives market, displaces older technology/idea with
new and offers consumers value they did not dream up yet.
30
“organizations have been aggressively instilling
innovation in its culture, especially high-tech
companies”
31
• Malaysia’s Innovation Year
• Resource based economy Innovation-
2010 driven economy
32
Team Creating
Empowerment
innovation change
33
Open mind Curiosity Empathy
34
China
In China, piracy and innovation go hand in hand.
Some of the most innovative products and business models coming out of the country are
the result, either directly or indirectly, of copycats.
And for China, that’s not necessarily a bad thing.
piracy can deter innovation, since it prevents companies from profiting off their
copyrighted products and thus diminishes the incentive to create.
The same factors that make Chinese manufacturing so appealing to big companies like
Apple—speed, flexibility, cheap parts and labor—make it a pirate’s paradise
Piracy goes back to the China world view that individual rights don’t matter.
The courts have never evolved to protect innovative individuals.
There is still very much the ethos that economic growth has to be managed, so individual
and intellectual property, where the spoils go to one entity or one person, is not a
cultural value
35
China’s domestic internet sector has developed some doubtful business
ethics.
First off, Alibaba, the country’s largest B2B site matching foreign
sources to Chinese manufacturers.
Alibaba’s chief executive, David Wei, and chief operating officer, Elvis
Lee, resigned after an internal investigation found that more than
2,300 sellers on the site committed fraud with the help of Alibaba sales
staff.
These devices can either be pre-loaded with illegal content before being sold to
customers, or customers can directly download infringing content.
Hard goods piracy continues to harm copyright owners in Malaysia. Such piracy
includes distribution of mostly burned-to-order recordable discs.
Pirates print, photo copy, or “clone,” meaning they print-on-demand directly from
high-quality soft-copy scans of physical books, which are then printed on high-
quality paper and include high-quality covers, making detection and identification
of infringement more difficult.
In many instances, the copy shops have been the subject of previous enforcement
actions by the MDTCC but due to the lack of follow-on actions by law enforcement
and the lack of any deterrence, the shops simply re-engage in the illegal production
or printing of unauthorized copies.
37
Piracy of books online is also reportedly on the rise, with
students claiming that certain titles are available either for
download or for copying (even from their university library).
38
Australia
An extensive survey conducted by respected analysis house Essential Research has
found that a huge proportion of Australians would continue to pirate content such as TV
shows and movies online, even if such content was made available everywhere globally
at the same time for a low price.
According to on going global research, Australians pirate more content online than
almost any other nation.
For example, when the series finale of popular AMC show Breaking Bad was released in
the US through cable networks in early October, the episode quickly made an
appearance on popular file-sharing sites, predominantly using the BitTorrent protocol
According to file-sharing news site TorrentFreak, the show was downloaded more than
500,000 times just 12 hours after the first copy appeared online.
Based on a sample of more than 10,000 people who shared the site via a BitTorrent
client, we see that Australia is once again in the lead with 18 percent of the total.
This means that a large group of Aussies prefer to torrent the episode instead of
watching it on the pay TV network Foxtel.
39
Those analysing Internet piracy in Australia have constantly pointed to the
fact that shows such as Breaking Bad are pirated locally by many Australians
because of the fact that the shows are not readily available on our own free
to air television stations or through Internet television platforms
The survey respondents claimed that the main reason they downloaded
material online was because they wished to access TV shows or movies not
yet available in Australia (32 percent), while others downloaded such content
because it was free (20 percent) or because accessing content that way was
“convenient” (24 percent). A small number of respondents said they
downloaded content because films and movies were too expensive
40
41
42
43
Technological developments like digital cameras,
projectors, mind training software, computers,
PowerPoint presentations, 3D visualization tools; all
these have become great sources for teachers to help
students grasp a concept easily.
44
When schools in different parts of the state ,
students can “meet" their counterparts through
video conferencing without leaving the
classroom.
45
With the introduction of online degree programs
there is hardly any need of being present
physically in the classroom. Even several foreign
universities have started online degree courses
that student can join.
46
47
Due to the excessive usage of online chatting
and shortcuts, the writing skills of today’s young
generation have declined quite tremendously.
49
SMS or text messaging has become a
favourite pastime of many students. Students
are seen playing with their cell phone,
iPhones day and night or driving and very
often even between lectures.
50
Many experts and experienced people say
that, due to such technology in education,
students imagination is affected, their
thinking ability is reduced
51
52
Without doubt, medical technology is
indispensable to people’s health and improved
quality of life. It also contributes billions of
dollars to the economy. There are many
benefits that innovative technology brings to
the table when it comes to healthcare.
53
the widespread adoption of electronic health records has
resulted in significant savings in health care costs as well as
improved patient health and safety. In more and more
healthcare facilities, patient files are being kept in databases
that can be accessed from anywhere in the facility.
54
the internet provides a cheap and “easy” way to
avoid going to the doctor. In the long term, however,
it may wind up costing you much more than you ever
expected.
55
56
Sleep deprivation: Teens need about 9 hours sleep
each day, but often text late into the night. That
means they can’t focus at school and cope well
with social pressures
58
Teens, in particular, crank up their phones loudly to
drown out traffic noise, conversation and even
other ambient music. About half of college students
in urban settings risk hearing loss.
59
60
61
Talking with friends
face to face has In the next 10 years,
Today, technology is Internet and mobile
been an important
transforming modern technology will destroy the
existing human
society and daily life quality of human social
connection tool for
years interactions
62
TECHNOLOGY “PROS”
The invention of the printing press in the 15th century and continuing up
through the proliferation of the internet in the 1990s, has allowed more
people access to an amount of information that would have once been
impossible. It helps them to become better educated and more informed.
Developments such as the Internet and satellite television have created new
medium and audiences through which and to which these organizations can
disseminate their information. News reports can be received which highlight
many different sides of an international conflict.
In the 20th century alone, the average lifespan of a human has increased
dramatically. This is due primarily to technology.
With new agricultural methods and equipment, the world is able to produce
more food with less work at a cheaper price. With better medicines and more
effective treatments, people can survive diseases that would have once easily
killed them.
63
TECHNOLOGY “PROS”
Individuals then have the ability to interact with other individuals through
such developments as e-mail, chat-rooms and the Usenet.
64
TECHNOLOGY “PROS”
The revolution of computer also helps people in secure the privacy and
personal right
65
TECHNOLOGY “PROS”
The work can be done in very less time.
Everything can be done at home . Online shopping are nowadays easier with
help of faster and wider range of internet. Thus the business transaction can
be done faster and time saving
Data Security
Data are more secure and can be kept secret with the technologies.
Information Technology has also had a major impact on a government’s
intelligence agencies. Encryption of sensitive information has enabled
government’s to obtain added security.
Job issue
Revolution of computer technology develop new careers. Thus gain more
job opportunities
Home as workplace . Eg Online Business
66
TECHNOLOGY “CONS”
Computers can distract a person so much they lose contact with the reality
around them such as taking time with family, husbands, boyfriends,
girlfriends, wives and children.
67
TECHNOLOGY “CONS”
While technology has greatly improved the overall health of humankind, it has
also afforded it the means to kill more people in a shorter period of time than
was once possible.
68
TECHNOLOGY “CONS”
Fraudulent in transaction
Piracy – Data / Software
Personal data can be stole easily because of the sharing
of personal information on various social network.
Various game which will gives negatives impact to the
younger generation who tend to follow and imitate it
A high percentage of people sit at their computer far too
long and some people lose reality as far as social
activities and learning social skills. Not to mention
packing on the weight and the lack of exercise.
69
70
Professional ethics refers to the ethics that a person
must adhere to in respect of their interactions and
business dealings in their professional life.
Professional ethics includes relationships with and
responsibilities toward customers, clients, coworkers,
employees, employers, others who use one’s products
and services, and others whom they affect
71
• Responsible computer
• Professional Ethics is • Includes professional confront
relationships with issues such as
concerned with
one’s behaviour and and responsibilities • 1) How much risk
towards customers, (safety, privacy,
conduct when
clients, coworkers, security)
carrying out
employees, • 2) Is acceptable in
professional work. It
employer, people systems
is codified and
varies across who use one’s • 3) what uses of
products and another company's
different cultures.
services and others intellectual property
whom one are acceptable
products affect
72
Maintaining relationship toward customers, clients,
coworker, employees and employers.
73
Knowing and learning enough about the
application field to do a good job.
74
“Do the Right Thing”
Behaving Ethically includes:
Being honest
Keeping promises
Doing your job well
Not stealing
Honestly is one of the most fundamental ethical
values; however, many ethical problems are
more subtle than the choice of being honest or
dishonest
Some ethical issues are controversial.
75
1. General more imperatives
2. More specific professional responsibilities
3. Organizational leadership imperatives
4. Compliance with code
76
Deontological
Emphasizes duty and absolute rules.
Rules should apply to everyone.
Use logic or reason to determine what is good.
Treat people as an ends (not a means).
Natural Rights
Derived from the nature of humanity
Focus is on the process by which people
interact.
Respect the fundamental rights of others,
including life, liberty, and property.
77
Consequentialist
includes Utilitarianism
Strive to increase “utility” for the most people
Consider the consequences for all affected
people.
Rule-Utilitarianism: Choose rules, or guidelines
for behavior, that generally increase utility.
Act-Utilitarianism: Analyze each action to
determine if it increases utility.
78
Reaching the Right Decision
There is no formula to solve ethical problems.
The computer professional must consider
trade-offs.
Ethical theories help to identify important
principles or guidelines.
79
Some Important Distinctions
Right, Wrong, and Okay: acts may be ethically obligatory,
ethically prohibited, or ethically acceptable.
Negative rights (liberties): the right to act without coercive
interference.
Positive rights (claim-rights): imposing an obligation on some
people to provide certain things.
Causing harm: some acts may cause harm to others but are
not necessarily unethical
Goals vs. actions: the actions we take to achieve our goals
should be consistent with our ethical constraints.
Personal preference vs. ethics: some issues we disapprove of
because of our dislikes, rather than on ethical grounds.
Law vs. ethics: some acts are ethical, but illegal; other acts
are legal, but unethical.
80
81
Professional organizations provide a general statement of
ethical values reminding people in the profession that
ethical behavior is an essential part of their job.
82
Professional Codes
ACM and IEEE CS
Software Engineering Code of Ethics and Professional Practice
ACM
ACM Code of Ethics
Respects confidentiality
83
1. PUBLIC
3. PRODUCT
4. JUDGMENT
6. PROFESSION
7. COLLEAGUES
8. SELF
85
The Malaysia Board of Technologists shall protect the
technologist and technician professional system by:
Investigating all
Ensuring only registered complaints brought to it Conducting disciplinary
persons provides against registered hearing for complaints
technology services. person or technology with prima facie case.
consultancy practice.
Issuing Notification,
Take action against
Guidelines, and Circular
registered person
as benchmarks for
pursuant to Section
quality of service in the
27(1).
technology profession.
86
The Malaysia Board of Technologists Code of Ethics require
registrants to comply with:
•Professionalism
Integrity
Competence
Benevolence
Diligence
•Strive to Perfection
Refer:
https://www.mbot.org.my/MBOT/files/44/443e3c13-8349-4295-acd2-0bb78c8984cb.pdf
87
Some Strengths and Weaknesses of Professional Codes (Tavani, 2013)
Strengths Weaknesses
Codes inspire the members of a profession Codes include directives that tend to be too
to behave ethically. general and too vague.
Codes guide the members of a profession in Codes are not always helpful when two or
ethical choices. more directives conflict.
Codes educate the members about their Codes comprise directives that are neither
professional obligations. complete nor exhaustive.
Codes discipline members when they violate Codes are ineffective (have no "teeth")in
one or more directives. disciplinary matters.
Codes inform the public about the nature Codes sometimes include directives that are
and roles of the profession. inconsistent with one another.
Codes "sensitize" members of a profession to Codes do not always distinguish between
ethical issues and alert them to ethical microethics issues and macroethics issues.
aspects they otherwise might overlook.
Codes enhance the profession in the eyes of Codes can be self-serving for the profession.
the public.
Responsibility, Legal Liability, and Accountability (Source: Tavani, 2013)
Moral Responsibility Legal Liability Accountability
Attributes blame (or Does not attribute blame Does not necessarily
praise) to individuals. or fault to those held attribute blame (in a
liable. moral sense).
Usually attributed to Typically applies to Can apply to individuals,
individuals rather than corporations and property groups of individuals, and
collectivities or groups. owners. corporations.
Notions of guilt and shame Compensation can be Someone or some group is
apply, but no legal required even when answerable (i.e., it goes
punishment or responsibility in a formal beyond mere liability).
compensation need result. sense is not admitted.
Be open and
Understand what honest about
Require a
success means capabilities,
convincing case for
safety, and
safety
limitations of
software
Include users (such as
medical staff,
technicians, pilots, office Don’t assume
workers) in the design existing software is Pay attention to
and testing stages to safe or correct, defaults
provide safe and useful review and test it
systems
Do a thorough, careful
job when planning and Develop
Design for real
scheduling a project communication
users
and when writing bids skills
or contracts
90
Analyzing a Professional Ethical Scenario
Brainstorming phase
List risks, issues, problems, consequences.
List all the stakeholders.
List possible actions.