SlideShare a Scribd company logo
1 of 20
Download to read offline
ETHICS
in software development
Jane Prusakova
@jprusakova
Professional Code of Conduct
• What is right and proper?
• Questions of morality
• What should always or never
be done?
Jeff Atwood, “Coding Horror”
Jeff Atwood, “Coding Horror”
Moral questions are hard
• IT is truly global
• Effects and results of a technology can occur far away and a long time
after its development
• Unintentional consequences can be significant
P:
«The culture of any organization
is shaped by the worst behavior
the leader is willing to tolerate.»
Gruenert and Whitaker
Technology and its consequences
• Dispensing drugs
• Testing automobiles
• Emissions
• Working brakes
• Transforming users and their data into product
Technology and its consequences
• Dispensing drugs
• Testing automobiles
• Emissions
• Working brakes
• Transforming users and their data into product
Technology and its consequences
Ethical concerns
• Evil software
• software that is likely to do harm
• Data
• what to keep, what to publish, how to use
• Bugs
• is it OK to not fix a bug or vulnerability
• Quality
• is it acceptable to deliver poor or untested product
Software and hardware bugs
• What is the harm?
• Who was harmed,
if anyone?
• What is the ethical
course of actions?
Picking into private matters
- Devices listen for specific word.
- Record audio and send out.
• Can this technology be trusted?
• What is the harm, if any?
Ethics of software products
• Does software add to the good of the people?
• Is there “evil” software?
• Who is responsible for software misuse leading
to harm?
• Should we, developers, be concerned about improper use?
• Is it OK for software to extend privileges to
some groups over others?
• Programmers have the power to decide who is “worthy”
Video jail visitation
- Leads to bans on in-person visits
- Limits accessibility of visitation
Encrypted communication makes
It harder for authorities to detect
Illegal and terrorist activities
Allows to target real-life harm to people.
Alt-right uses social networking sites
to spread their message.
Fake news
Advertising
Disseminates false information
for financial or political gain
Software development industry
ethics
• Is where a trade off between productivity and
diversity and inclusion?
• Is it OK to fail?
• Is it ethical to require a “death march” from the
team?
• Is it acceptable to keep a high-performing
person who is a bully?
What ethical dilemmas
are you facing?
ETHICS
in software development
Jane Prusakova
@jprusakova

More Related Content

More from DevOpsDays DFW

Bjorn Edwin - Start Your Own DevOps Dojo in 8 Simple Steps
Bjorn Edwin - Start Your Own DevOps Dojo in 8 Simple StepsBjorn Edwin - Start Your Own DevOps Dojo in 8 Simple Steps
Bjorn Edwin - Start Your Own DevOps Dojo in 8 Simple StepsDevOpsDays DFW
 
Crux Conception - 'TECH-LIVES MATTER, HANDS UP, DON'T REBOOT'
Crux Conception - 'TECH-LIVES MATTER, HANDS UP, DON'T REBOOT'Crux Conception - 'TECH-LIVES MATTER, HANDS UP, DON'T REBOOT'
Crux Conception - 'TECH-LIVES MATTER, HANDS UP, DON'T REBOOT'DevOpsDays DFW
 
Dana Finster - DevOps - Do the Math
Dana Finster - DevOps - Do the MathDana Finster - DevOps - Do the Math
Dana Finster - DevOps - Do the MathDevOpsDays DFW
 
Detangling complex systems with compassion & production excellence
Detangling complex systems with compassion & production excellenceDetangling complex systems with compassion & production excellence
Detangling complex systems with compassion & production excellenceDevOpsDays DFW
 
Speeding Up Innovation
Speeding Up InnovationSpeeding Up Innovation
Speeding Up InnovationDevOpsDays DFW
 
DevOps Theory vs. Practice: A Song of Ice and Tire-Fire
DevOps Theory vs. Practice: A Song of Ice and Tire-FireDevOps Theory vs. Practice: A Song of Ice and Tire-Fire
DevOps Theory vs. Practice: A Song of Ice and Tire-FireDevOpsDays DFW
 
Hidden Costs of Chasing the Mythical 'Five Nines'
Hidden Costs of Chasing the Mythical 'Five Nines'Hidden Costs of Chasing the Mythical 'Five Nines'
Hidden Costs of Chasing the Mythical 'Five Nines'DevOpsDays DFW
 
Stepping Up Your DevOps With Step Functions
Stepping Up Your DevOps With Step FunctionsStepping Up Your DevOps With Step Functions
Stepping Up Your DevOps With Step FunctionsDevOpsDays DFW
 
DevSecOps Through Blunt Force Trauma, I'm the Trauma
DevSecOps Through Blunt Force Trauma, I'm the TraumaDevSecOps Through Blunt Force Trauma, I'm the Trauma
DevSecOps Through Blunt Force Trauma, I'm the TraumaDevOpsDays DFW
 
Avoid the Distributed Monolith!!
Avoid the Distributed Monolith!!Avoid the Distributed Monolith!!
Avoid the Distributed Monolith!!DevOpsDays DFW
 
Using Docker to Build Software
Using Docker to Build SoftwareUsing Docker to Build Software
Using Docker to Build SoftwareDevOpsDays DFW
 
Managing Cloud Infrastructure at Scale
Managing Cloud Infrastructure at ScaleManaging Cloud Infrastructure at Scale
Managing Cloud Infrastructure at ScaleDevOpsDays DFW
 
The 12 Layer Burrito VS The 12 Factor APP
The 12 Layer Burrito VS The 12 Factor APPThe 12 Layer Burrito VS The 12 Factor APP
The 12 Layer Burrito VS The 12 Factor APPDevOpsDays DFW
 
The "Run Anywhere" Mindset
The "Run Anywhere" MindsetThe "Run Anywhere" Mindset
The "Run Anywhere" MindsetDevOpsDays DFW
 
Fostering The Third Way - Your DevOps Dojo
Fostering The Third Way - Your DevOps DojoFostering The Third Way - Your DevOps Dojo
Fostering The Third Way - Your DevOps DojoDevOpsDays DFW
 
Scaling Continuous Delivery to Walmart
Scaling Continuous Delivery to WalmartScaling Continuous Delivery to Walmart
Scaling Continuous Delivery to WalmartDevOpsDays DFW
 
What I learned from 5 years of sciencing the crap out of DevOps
What I learned from 5 years of sciencing the crap out of DevOpsWhat I learned from 5 years of sciencing the crap out of DevOps
What I learned from 5 years of sciencing the crap out of DevOpsDevOpsDays DFW
 

More from DevOpsDays DFW (18)

Bjorn Edwin - Start Your Own DevOps Dojo in 8 Simple Steps
Bjorn Edwin - Start Your Own DevOps Dojo in 8 Simple StepsBjorn Edwin - Start Your Own DevOps Dojo in 8 Simple Steps
Bjorn Edwin - Start Your Own DevOps Dojo in 8 Simple Steps
 
Crux Conception - 'TECH-LIVES MATTER, HANDS UP, DON'T REBOOT'
Crux Conception - 'TECH-LIVES MATTER, HANDS UP, DON'T REBOOT'Crux Conception - 'TECH-LIVES MATTER, HANDS UP, DON'T REBOOT'
Crux Conception - 'TECH-LIVES MATTER, HANDS UP, DON'T REBOOT'
 
Dana Finster - DevOps - Do the Math
Dana Finster - DevOps - Do the MathDana Finster - DevOps - Do the Math
Dana Finster - DevOps - Do the Math
 
Detangling complex systems with compassion & production excellence
Detangling complex systems with compassion & production excellenceDetangling complex systems with compassion & production excellence
Detangling complex systems with compassion & production excellence
 
Speeding Up Innovation
Speeding Up InnovationSpeeding Up Innovation
Speeding Up Innovation
 
DevOps Theory vs. Practice: A Song of Ice and Tire-Fire
DevOps Theory vs. Practice: A Song of Ice and Tire-FireDevOps Theory vs. Practice: A Song of Ice and Tire-Fire
DevOps Theory vs. Practice: A Song of Ice and Tire-Fire
 
Hidden Costs of Chasing the Mythical 'Five Nines'
Hidden Costs of Chasing the Mythical 'Five Nines'Hidden Costs of Chasing the Mythical 'Five Nines'
Hidden Costs of Chasing the Mythical 'Five Nines'
 
Stepping Up Your DevOps With Step Functions
Stepping Up Your DevOps With Step FunctionsStepping Up Your DevOps With Step Functions
Stepping Up Your DevOps With Step Functions
 
DevSecOps Through Blunt Force Trauma, I'm the Trauma
DevSecOps Through Blunt Force Trauma, I'm the TraumaDevSecOps Through Blunt Force Trauma, I'm the Trauma
DevSecOps Through Blunt Force Trauma, I'm the Trauma
 
Avoid the Distributed Monolith!!
Avoid the Distributed Monolith!!Avoid the Distributed Monolith!!
Avoid the Distributed Monolith!!
 
Using Docker to Build Software
Using Docker to Build SoftwareUsing Docker to Build Software
Using Docker to Build Software
 
Managing Cloud Infrastructure at Scale
Managing Cloud Infrastructure at ScaleManaging Cloud Infrastructure at Scale
Managing Cloud Infrastructure at Scale
 
The 12 Layer Burrito VS The 12 Factor APP
The 12 Layer Burrito VS The 12 Factor APPThe 12 Layer Burrito VS The 12 Factor APP
The 12 Layer Burrito VS The 12 Factor APP
 
The "Run Anywhere" Mindset
The "Run Anywhere" MindsetThe "Run Anywhere" Mindset
The "Run Anywhere" Mindset
 
Fostering The Third Way - Your DevOps Dojo
Fostering The Third Way - Your DevOps DojoFostering The Third Way - Your DevOps Dojo
Fostering The Third Way - Your DevOps Dojo
 
StereoTyped 101
StereoTyped 101StereoTyped 101
StereoTyped 101
 
Scaling Continuous Delivery to Walmart
Scaling Continuous Delivery to WalmartScaling Continuous Delivery to Walmart
Scaling Continuous Delivery to Walmart
 
What I learned from 5 years of sciencing the crap out of DevOps
What I learned from 5 years of sciencing the crap out of DevOpsWhat I learned from 5 years of sciencing the crap out of DevOps
What I learned from 5 years of sciencing the crap out of DevOps
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Ethics in Software Development

  • 1. ETHICS in software development Jane Prusakova @jprusakova
  • 2.
  • 3. Professional Code of Conduct • What is right and proper? • Questions of morality • What should always or never be done?
  • 6. Moral questions are hard • IT is truly global • Effects and results of a technology can occur far away and a long time after its development • Unintentional consequences can be significant
  • 7. P: «The culture of any organization is shaped by the worst behavior the leader is willing to tolerate.» Gruenert and Whitaker
  • 8. Technology and its consequences • Dispensing drugs • Testing automobiles • Emissions • Working brakes • Transforming users and their data into product
  • 9. Technology and its consequences • Dispensing drugs • Testing automobiles • Emissions • Working brakes • Transforming users and their data into product
  • 10. Technology and its consequences
  • 11. Ethical concerns • Evil software • software that is likely to do harm • Data • what to keep, what to publish, how to use • Bugs • is it OK to not fix a bug or vulnerability • Quality • is it acceptable to deliver poor or untested product
  • 12.
  • 13. Software and hardware bugs • What is the harm? • Who was harmed, if anyone? • What is the ethical course of actions?
  • 14. Picking into private matters - Devices listen for specific word. - Record audio and send out. • Can this technology be trusted? • What is the harm, if any?
  • 15. Ethics of software products • Does software add to the good of the people? • Is there “evil” software? • Who is responsible for software misuse leading to harm? • Should we, developers, be concerned about improper use? • Is it OK for software to extend privileges to some groups over others? • Programmers have the power to decide who is “worthy”
  • 16. Video jail visitation - Leads to bans on in-person visits - Limits accessibility of visitation Encrypted communication makes It harder for authorities to detect Illegal and terrorist activities Allows to target real-life harm to people. Alt-right uses social networking sites to spread their message. Fake news Advertising Disseminates false information for financial or political gain
  • 17. Software development industry ethics • Is where a trade off between productivity and diversity and inclusion? • Is it OK to fail? • Is it ethical to require a “death march” from the team? • Is it acceptable to keep a high-performing person who is a bully?
  • 19.
  • 20. ETHICS in software development Jane Prusakova @jprusakova