professionalism and ethical responsibilities

上传人:人*** 文档编号:569782473 上传时间:2024-07-31 格式:PPT 页数:55 大小:298KB
返回 下载 相关 举报
professionalism and ethical responsibilities_第1页
第1页 / 共55页
professionalism and ethical responsibilities_第2页
第2页 / 共55页
professionalism and ethical responsibilities_第3页
第3页 / 共55页
professionalism and ethical responsibilities_第4页
第4页 / 共55页
professionalism and ethical responsibilities_第5页
第5页 / 共55页
点击查看更多>>
资源描述

《professionalism and ethical responsibilities》由会员分享,可在线阅读,更多相关《professionalism and ethical responsibilities(55页珍藏版)》请在金锄头文库上搜索。

1、Professionalism and Ethical ResponsibilitiesNature of ProfessionalismNicole L. MendoleraWhat is Professionalism?Code of EthicsCode of EthicslAcademic HonestylAdherence to Confidentiality AgreementlData PrivacylHandling of Human SubjectslImpartiality in Data AnalysislProfessional AccountabilitylResol

2、ution of Conflicts of InterestslSoftware PiracyAcceptable Use Policies In The WorkplaceBy: Brian JubaGroup 2The Internet: A Valuable Resource?AdvantageslStreamlined time-consuming business tasks.lFaster communication.Disadvantagesl Distractions at work shopping, pornography, gambling, gamesStats abo

3、ut the workplacel30%-40% of employee Internet usage isnt work related.l70% of all web traffic to internet porn sites occurs between 9am and 5pm according to Sex Tracker.l92% of online stock trading occurs during work hours and 46% of online holiday shopping.Company ComplaintsLoss Of ProductivitylMod

4、em connections at home, high speed at work, entices employees to use work connection for “web leisure”.Liability From MisuselTransferring of sexual images creates a “hostile work environment”.lEmails clearly document evidence of discrimination and sexual harassment.lUnauthorized access resulting in

5、release of confidential information.Company MisrepresentationlSystems identify username with affiliation.lMessages and email thought to have come from the company instead of the individual.lEmployees shop online and fail to pay for goods.Acceptable Use PolicieslUsed to combat the misuse and ensurepr

6、iorities are on work.lShould be written down.lA “living document” able to evolve.lOutline “what kind of Internet usage is permitted, what kind is not, and the consequences for violating the rules”. Sections Of A Basic Policyl“Employment Is At Will” DisclaimerlNetwork LimitationsStates appropriate an

7、d inappropriate acts.lLevel Of Privacy To Be ExpectedLogging and monitoring.lDamage To ResourcesAccess only through firewall. No unauthorized input of data.lDeletion Of MaterialHow Does The ACM Tie In?Section 1.4 lMembers should not discriminate.Section 1.7 lRespect the privacy of others.Section 1.8

8、 lMaintaining ConfidentialitySection 2.6 lHonor Contractual AgreementsSection 3.3 lCreate policies that support proper use.FuturelControlling the Internet is no longer an IT problem. lMitigated itself into a “corporate issue”.lBest dealt by Human Resources People.lA survey of HR people found that mo

9、nitoring employees to make sure they are not wasting time has become an increasing problem.lFinding the appropriate balance between work time and personal time on the Internet.lFind a way to increase the bottom line without increasing liability.Tools AvailablelFiltering Software lAccess PolicieslLog

10、ging SoftwarelN2H2, SurfControl, ConnectotelEthical Dissent and Whistle-BlowingMcDonnell Douglass DC-10lIn 1972: American Airlines Flight 96 malfunctionnine passenger and two flight attendants were injured.lIn 1974: Turkish Airline Flight 981 crashedall 335 passengers and 11 crew members were killed

11、 (the 5th worst aviation disaster in history)lIn 1979: American Airlines Flight 191 crashed275 people were killedlIn 1979:Air New Zealand Flight 901 crashedlIn 1989: United Airlines Flight 232 crashed112 of its 296 passengers and crew members were killed.McDonnell Douglass DC-10 ContdlThere was mech

12、anical and designing problem in DC-10s cargo doors and employees knew about the problem.lNo on Blew the Whistle!Ethical Dissent and Whistle-BlowinglEthical DissentNoticing the wrongdoings in the organization and attempting to get them changed within the organization.lWhistle-BlowingMaking your disse

13、nt public by going outside the organization.ex) involvement of an unfolding number of agencies, lawyers, legal systems, and public proceedings.Whistle-BlowinglFirst used in the early 1970s by Ralph Nader“An act of a man or a woman who believing in the public interest overrides the interest of the or

14、ganization he serves, and publicly blows the whistle if the organization is involved in corrupt, illegal, fraudulent or harmful activity”.The Hughes Whistle-Blowing CaselHughes Electronics Hybrid chipsUsed in guidance system and other military programs.ex) weapon systems in F-14, F-15, F16 and F-18

15、aircraft.Needed to be tested to make sure that they can withstand years of exposure to the extreme environmental hazards they might face.ex) rapid changes in temperature, severe shock, changes in atmospheric pressure, etc.However, the tests were skipped sometimes.The Hughes Whistle-Blowing CaselWhis

16、tle-BlowersMargaret Goodearl and Ruth AldredlOutcomeOn June 15th, 1992, Hughes was found guilty of conspiring to defraud the government.In 1996, Hughes was assessed 4.05 million for their fraud. Goodearl and Aldred were awarded $891,000 of this amount (22%). Hughes also had to pay the legal fees for

17、 Goodearl and Aldred ($450,000).The Hughes Whistle-Blowing CaselWhy would Margaret Goodearl blew the whistle?One account quoted Goodearl describing her motivation for whistle-blowing as follows:“I had no choice Ive got three sons and a daughter, and any one of them could wind up in the military and

18、dead because of these bad parts”.What would you do?Major Codes of EthicslIn fact, the codes of ethics of our professional societies require the professional to blow the whistle in certain circumstances.lExamples:IEEE CodeACM CodeIEEE-CS/ACM Software Engineering CodeAITP Standards of ConductACM Code

19、of EthicslIn the work environment the computing professional has the additional obligation to report any signs of system dangers that might result in serious personal or social damage. If ones superiors do not act to curtail or mitigate such dangers, it may be necessary to blow the whistle to help c

20、orrect the problem or reduce the risk. (item 1.2 of the ACM code)The Decision is Yours!Various Forms of Professional CredentialingBy David HockenberryTwo Types of Professional Credentialing:lCertificationslLicensesCertificationslVoluntary process.lAdministrated by a professional society or manufactu

21、rer.Many Computing Certifications:lGeneral Certified Software Development Program (CSDP) administrated by the IEEE.lManufacturer specific Microsoft Certified Application Developer (MCAD) administrated by MicrosoftSurvey of Certified Computing Professionals Found: HandoutsSurvey of Certified Computin

22、g Professionals Found: (Continued)Survey of Certified Computing Professionals Found: (Continued)LicenseslMandatory, legal process.lAdministrated by the state or federal government.Software Engineering LicensinglFairly new -First professional software engineer was licensed in 1998 in Texas.lAdvantage

23、s -Same as certification.lDisadvantages -Can be held legally responsible.Dealing With Harassment and Discrimination HistorylEqual Pay Act of 1963lcivil rights act of 1964, Title VII lRehabilitation Act of 1973lDisabilities act of 1990 lNineteenth Century Civil Rights Acts, 1993Ensures equalitySpecif

24、ies damageslHarassment- Based on discrimination lawsHarassment-DefinitionlSpeech, actions are workplace harassment if:severe or pervasivecreate a hostile or abusive work environmentbased on race, religion, sex, national origin, age, disability, military membership for the harassed and for a reasonab

25、le person. Sexual HarassmentlMost common type of harassmentlDefinition: any unwanted activity of a sexual nature that affects an individuals employment Unwanted touchingUnnecessary Requests for datesCoercive threatslGray AreaLooks, comments, jokes, nude calendars, etc.Other Types of HarassmentlRelig

26、iousCompany newsletterPrayerAnti-religious talklPolitical/socialPolitical BeliefsConstruction workersl“Men at Work”Discrimination-Definitionldiscrimination is bias based on race, sex, religion, national origin, physical disability, and age by employers. There is a growing body of law preventing or o

27、ccasionally justifying employment discrimination based on sexual orientation. Discriminatory practices include bias in hiring, promotion, job assignment, termination, compensation, and various types of harassment. Types of DiscriminationlHiringMust give an equal opportunity to those of all religions

28、, races, gendersDisability:lIf only reasonable accommodation is necessary, you cannot discriminateAgelMust consider people of any ageAffirmative actionlJob AssignmentsMust Give equal job assignments to employees of same experience/skillCannot promote people of a certain race/gender over otherslPayMu

29、st pay all equally experienced and talented employees equallyCannot give more/less money because of gender/racePay GaplStill exists, Hopefully will change soonDealing with HarassmentlTrainingMandatory for all employees and managersHelps employees to understand what exactly harassment isReduce accide

30、ntal harassment, increases understanding of itlHarassment Reporting/staffAllows employees to easily report harassmentlManagerslHarassment HotlinelHarassment staffHelp remedy situation in best way possiblelPoliciesZero Tolerance policyAmiable SolutionlParties meetlDiscuss friendly terms, misunderstan

31、dingRemedieslFiringlDocking vacation daysStopping DiscriminationlEducationDiscrimination TrainingDiversity TrainingWorking with Diverse peoplelReportingSimilar to harassmentInvestigate claimsKeep track of EmploymentStopping DiscriminationlRemediesZero Tolerance policyAmiable SolutionlParties meetlDi

32、scuss friendly terms, misunderstandingPunishmentlFiringlDocking vacation dayslFalse ClaimsPerceived DiscriminationNo actual DiscriminationlSit down talk with both partiesFalse claims to make moneylSome remedies against false claimsThe FuturelHarassment and Discrimination will be more prominent in ou

33、r liveslNew IssuesSexual OrientationAffirmative ActionlHarassment and Discrimination are bad for societylLaws against them help make society betterThe Role of Professionals in Public PolicyBy Di ZhangHistorylComputer EthicsDidnt existPolicy vacuumlNorbert WienerSocial and ethical consequencesThe Boo

34、k: Cybernetics:or control and communication in the animal and the machineFocuseslComputers in the workplacelComputer crimelPrivacy and anonymitylIntellectual property Computers in the WorkplacelHealth and safetyUS Department of LaborStressPhysical damageRadiationComputer CrimelVirusesTrojan HorseWor

35、mslHackersPrivacy and AnonymitylPrivacySensitive dataPersonal informationlAnonymityProtectionlLawsInformation Disclosure Act of 1997lLegal Charges Intellectual PropertylSoftware and AlgorithmsDuplicationsIllegal ModificationslPatentsProsConsPatent SearchesIBM Patent Against Linux WorldOrganizationslACM & IEEEEnforce the Codes of EthicsMoral guidlinesSpecific professional responsibilitieslCSAC/CSABEthics adoption in Computer Science DegreeThe FuturelResponsibilities to ensure that computing technology is being used for the good of the public.

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 大杂烩/其它

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号