0% found this document useful (0 votes)
71 views

Lecture No. 7 Professional Ethics & Codes of Conduct

Ali is a database programmer who has been stuck on a difficult statistical programming problem for months. He remembers code from a coworker and a commercial software package that could help solve his problem. He incorporates segments of code from both into his program without giving credit. This violates ethics principles around intellectual property and plagiarism. Aisha is designing a database for a company. The client wants less security than Aisha recommends, putting sensitive employee data at risk. Aisha must decide whether to honor her responsibility to protect privacy or follow the client's less secure request.

Uploaded by

Ensha Anwash
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views

Lecture No. 7 Professional Ethics & Codes of Conduct

Ali is a database programmer who has been stuck on a difficult statistical programming problem for months. He remembers code from a coworker and a commercial software package that could help solve his problem. He incorporates segments of code from both into his program without giving credit. This violates ethics principles around intellectual property and plagiarism. Aisha is designing a database for a company. The client wants less security than Aisha recommends, putting sensitive employee data at risk. Aisha must decide whether to honor her responsibility to protect privacy or follow the client's less secure request.

Uploaded by

Ensha Anwash
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

LECTURE NO.

7
PROFESSIONAL ETHICS & CODES OF
CONDUCT
Ethical decision making: Case 1

■ Ali is a database programmer


– Large statistical program needed by his company (actuarial requirements)
– Company programmers are encouraged to publicize their work
■ Ali has found himself stuck on a problem
– Has persisted at this for several months
– His manager does not recognize complexity of problem.
– She insists job be completed in the few days.
■ Ali remembers:
– Co-worker had given him source listings of their current work
– He also has an early version of commercial software developed at another company
■ Ali studies these programs
– Sees two areas of code which could be directly incorporated into his own program
– He uses segments of code both from his coworker and from the commercial software
– He does not tell anyone or mention it in the documentation.
■ He completes the project and turns it in a day ahead of time.
■ How does the Code of Ethics help us understand this case?
Applying the code: Case 1

■ This case highlights issues involving intellectual property


– 1.6: “Give proper credit for intellectual property”
– Specifically, do not take credit for other’s ideas or work.

■ Property rights principle (1.5)


– copyrights, patents, trade secrets, license agreements

■ Restrictions also ground in:


– integrity (1.3)
– complying with existing laws (2.3)
■ Ali violated professional ethics in two areas:
– Failure to give credit for another’s work
– Using code from a commercial package that (presumably) was copyrighted
■ If Ali only “looked” at co-worker’s source code:
– Could he then write his own program and still have an obligation to give credit?
■ Yes:
– He should have acknowledged credit in documentation.
– (Some professional discretion possible here, especially if intellectual material is trivial)
■ Use of commercial software code was also not appropriate:
– Ali should have checked to determine whether or not company was authorized to use source code before
using it.
■ In general:
– Desirable to share and exchange intellectual materials
– But using bootlegged software is definitely a violation of code.
Ethical decision making: Case 2

■ Three years ago, Aisha started her own consulting business


■ She is so successful she now has several people working for her.
■ Have many clients.
■ Includes work such as advising on network architectures, designing DBMSes, security.
■ Presently designing a DBMS for the personnel office a medium-sized (100 person) company
■ Aisha has involved client in design process
■ Informs CEO, CTO and human resources head about system progress
■ Now it is time to make decisions about the kind and degree of security to build into system.
Ethical decision making: Case 2
■ Aisha has described several options.
■ Because of cost overruns, client has decided to opt for a less secure system.
■ Aisha believes information they will store is extremely sensitive (performance evaluations,
medical records for insurance claims, salaries, etc.)
■ With weak security:
■ Employees on workstations could figure out how to access this data.
■ Online intruders would also have access
■ Aisha feels strongly that system should be much more secure.
■ She has tried to explain the risk.
■ CEO, CTO and HR all agree that less security will do.
■ What should Aisha so?
■ Should she refuse to build the system as they request
Applying the Code: Case 2

■ This case highlights issues involving privacy


– Principle 1.7 deals with privacy
– Principle 1.8 deals with confidentiality

■ Code guidelines state that:


– “Computer professionals are obligated to preserve the integrity of data about individuals…”
– “… from unauthorized access or accidental disclosure to inappropriate individuals”

■ Code also specifies for organizational leaders:


– Principle 3.5 (enhance personal dignity)
– Principle 3.4 (assess needs of all those affected by system)

■ Company officials:
– Have an obligation to protect privacy of their employees.
– Therefore they should not accept inadequate security.
■ Aisha’s first obligation:

■ Attempt to educate company officials (implied by principle 2.7)


– If that fails, she needs to consider her contractual obligations (principle 2.6) in honouring
assigned responsibilities.
– We don’t have Aisha’s contract, but she may have to choose between her contract and her
obligation to honour privacy and security.

You might also like