2. Ethics can be defined broadly as
a set of moral principles or values.
3. Protect an organization and its employees
from legal action.
Create an organization that operates
consistently.
Provide a livelihood for employees.
Avoid unfavorable publicity.
Gain the goodwill of the community.
4. Bribes involve providing money,
property, favors, or anything else of
value to someone in business or
government in order to obtain a
business advantage.
Gifts are made openly and publicly as
a gesture of friendship or goodwill
with no expectation of a future favor
for the donor.
5. Appoint a corporate ethics officer.
Ethical standards should be set by a board of
directors.
Establish a corporate code of conduct.
Conduct social audits.
Require employees to take ethics training.
Include ethical criteria in employee
appraisal/reward systems.
6. A guide that highlights an organization’s key
ethical issues and identifies the overarching
values and principles that are important to
the organization and that can help in
decision making.
The code of conduct helps ensure that
employees:
◦ Abide by the law.
◦ Follow necessary regulations.
◦ Behave in an ethical manner.
7. Sample Code of Conduct from
Proctor and Gamble
8. 1. Get the facts.
2. Identify the stakeholders and their positions.
3. Consider the consequences of your decision.
4. Weigh various guidelines and principles (Virtue,
Utilitarian, Fairness, Common Good).
5. Develop and evaluate options.
6. Review your decision.
7. Evaluate the results of your decision.
9. Approach to Dealing Principle
with Moral Issues
Virtue Approach The ethical choice is the one that best reflects
moral virtues in ourselves and our community.
Utilitarian Approach The ethical choice is the one that produces the
greatest excess of benefits over harm.
Fairness Approach The ethical choice is the one that treats
everyone the same and does not show
favoritism or discrimination.
Common Good The ethical choice is the one that advances the
Approach common good.
10. The increased use of information technology has
raised many ethical issues for today’s IT
professional.
◦ Licensing of IT professionals
◦ Internet communication
◦ Intellectual property
◦ Employee/employer issues
11. ◦ Today’s workers are subject to the monitoring of
their e-mail and Internet access while at work, as
employers and employees struggle to balance the
need of the employer to manage important company
assets and employees’ work time versus the
employees’ desire for privacy and self-direction.
12. ◦ Students around the world have been caught downloading
material from the Internet and plagiarizing content for their
term papers.
◦ Hackers engaged in acts of cyberterrorism defaced hundreds
of Web sites and left hate messages after a collision between a
United States spy plane and a Chinese jet fighter.
13. The person’s ethical standards are different
from those of society as a whole.
The person chooses to act selfishly.
In many instances, both reasons exist.
14. Embezzlers Con artists Shoplifters
Most people who commit such acts feel no
remorse when they are apprehended because
their ethical standards differ from those of
society as a whole.
15. Everybody does it.
If it’s legal, it’s ethical.
Likelihood of discovery and consequences
16. An ethical dilemma is a situation a
person faces in which a decision must
be made about appropriate behavior.
17. 1. Obtain the relevant facts.
2. Identify the ethical issues from the facts.
3. Determine who is affected.
18. 4. Identify the alternatives available to the
person who must resolve the dilemma.
5. Identify the likely consequence
of each alternative.
6. Decide the appropriate action.
19. A staff person has been informed that
he will work hours without recording
them as hours worked.
Firm policy prohibits this practice.
Another staff person has stated that
this is common practice in the firm.
20. Is it ethical for the staff person to
work hours and not record them
as hours worked in this situation?
Who is affected?
How are they affected?
What alternatives does the staff
person have?
21. Our society has attached a special
meaning to the term professional.
A professional is expected to conduct
himself or herself at a higher level
than most other members of society.
22. Special Responsibilities of IT Professionals
Maintaining relationships with and responsibilities
toward customers, clients, coworkers, employees, and
employers.
Making critical decisions that have significant
consequences for many people.
Determining how to manage, select, or use computers
in a professional setting.
23. IT Professionals should
experts in their field,
Know customers rely on their knowledge, expertise, and
honesty,
Understand their products (and related risks) affect many
people,
Follow good professional standards and practices,
Maintain an expected level of competence and are up-
to-date on current knowledge and technology, and
Educate the non-computer professional.
24. Professional ethics concerns:
One's conduct of behaviour and practice while doing
professional work,
Relations with peers in the work place,
Conduct of duties towards the employer,
Obligations towards the customer,
Responsibility for the future of the profession at large.
Responsibility for the wellbeing of the society at large.
24
25. 1. to accept responsibility in making decisions consistent with the safety, health
and welfare of the public, and to disclose promptly factors that might
endanger the public or the environment;
2. to avoid real or perceived conflicts of interest whenever possible, and to
disclose them to affected parties when they do exist;
3. to be honest and realistic in stating claims or estimates based on available
data;
4. to reject bribery in all its forms;
5. to improve the understanding of technology, its appropriate application, and
potential consequences;
25
26. 6. to maintain and improve our technical competence and to undertake
technological tasks for others only if qualified by training or
experience, or after full disclosure of pertinent limitations;
7. to seek, accept, and offer honest criticism of technical work, to
acknowledge and correct errors, and to credit properly the
contributions of others;
8. to treat fairly all persons regardless of such factors as race, religion,
gender, disability, age, or national origin;
9. to avoid injuring others, their property, reputation, or employment by
false or malicious action;
10. to assist colleagues and co-workers in their professional
development and to support them in following this code of ethics.
26
27. A Code of Ethics enables us to:
Set out the ideals and responsibilities of the profession
Exert a de facto regulatory effect, protecting both clients and
professionals
Improve the profile of the profession
Motivate and inspire practitioners, by attempting to define their raison
d'être
Provide guidance on acceptable conduct
Raise awareness and consciousness of issues
Improve quality and consistency
Atilla.Elci@EMU.edu.tr CmpE 598- 28.03.2006 27
28. On the other hand, we must also consider:
Whether the so-called standards are obligatory, or are
merely an aspiration
Whether such a code is desirable or feasible
Whether ethical values are universal or culturally
relativistic
The difficulty of providing universal guidance given the
heterogeneous nature of the profession
What the point is of specifying responsibilities, given the
limited regulatory function of a code.
Atilla.Elci@EMU.edu.tr CmpE 598- 28.03.2006 28
29.
30. The social implications of computing is a
growing topic
This topic has many subsets
◦ Economics, politics, ethics, crime…
The purpose of studying this topic
◦ To create awareness and educate
◦ Prevent problems before they occur
◦ Work together as a society to understand the issues and
develop solutions
31. Concept of an “information society” came
about in the early 1960’s
38 Years for 30 percent of America to own a
telephone
7 Years for 30 percent of America to be
connected to the internet
In 2000, 55,000 people each day used the
internet for the first time
32. Governments and individuals believe much of
the information on the Internet is subversive,
dangerous, or immoral
◦ Prime example: pornography
◦ In 2001, Spam was eight percent of all emails
◦ In 2003, Spam was 40 percent of all emails
Child Internet Protection Act
33. Exchange of information among individuals
and groups
Does technology decrease social activity???
Internet relationships can lead to disaster
◦ Lack of authenticity leads to misleading
◦ Exploitation of America’s youth by predators
34. “Digital technology’s ubiquity and its increasing
invisibility have the effect of making it appear
almost natural” (Gene, 198)
Privacy will become a larger issue
“In a World Without Secrets, many of the
secrets we lose are those that we give away
freely, without thinking, in return for the
elimination of some small frictions” (Richard,
256)
35.
36. Everyone can converse with anyone.
Computer networks compress time and space
However, the physical attributes of a
conversation are also lost.
37. The lost attributes like body language, facial
expression and tone of voice cannot be
replaced .
Users have not replaced but rather
supplemented the new methods to enhance
communication.
Users have develop new ways to express the
commonly used emotions. ; )
38. Email, Instant Messaging
Both end users know who the other person is
to some extend.
Email and IM is like a home address and a
telephone number.
◦ A level of privacy is expected.
◦ Users expect to know who and why they are being
contacted in those mode.
39. Mailing Lists, Web Forums, Chat Rooms,
Internet Relay Chat (IRC)
All these mode of communication gives the
user a high level of anonymity. Users are often
known only by a nickname.
Users can use different or multiple aliases.
◦ Can be use for malicious intend
◦ Users gravitate toward a known group of trusted users
40. The Internet was envisioned during the arms
race with Russia.
It was created in 1969 by the Advanced
Research Projects Agency (ARPA).
In 1972, electronic mail was introduced by
Ray Tomlinson, a computer scientist.
41. In 1973, the Transmission Control
Protocol/Internet Protocol (TCP/IP) is
designed.
In 1983 this protocol becomes the standard
for communicating between computers over
the Internet.
Finally, in 1982 the term “Internet” is coined.
42. In the beginning, the Internet is simply packet
switching and emails.
It is not until 1989 that the Internet becomes
available to the public and user friendly when
The World debuts.
Tim Berners-Lee of CERN (European
Laboratory for Particle Physics) develops a
new technique for distributing information on
the Internet.
43. He calls it the World Wide Web.
The Web is based on hypertext.
It allows the user to connect from one
document to another at different sites on the
Internet through hyperlinks.
The Web is accessible through a graphical
user interface (GUI).
44. 1995 - CompuServe, America Online, and
Prodigy start providing dial-up Internet
access.
1996 - Approximately 45 million people are
using the Internet, with roughly:
◦ 30 million of those in North America (United States
and Canada)
◦ 9 million in Europe
◦ 6 million in Asia/Pacific (Australia, Japan, etc.)
45. By 1999, the number of Internet users
worldwide reaches 150 million and more
than 50% are from the United States.
“E-commerce” becomes the new buzzword
as Internet shopping spreads like wildfire.
46. In 2000, the never ending flow of fortunes
coming from Internet is halted.
Investment capital dries up and the Nasdaq
stock index plunges
This causes many dotcom companies to go
bankrupt.
47. In 2001, about 9.8 billion electronic
messages are sent daily.
In 2002 of January, 58.5% of the U.S.
population (164.14 million people) uses the
Internet. Worldwide there are 544.2 million
users.
48. The Internet has grown rapidly since its birth
at ARPA.
It has become a societal standard within
America.
We can try to control it, but we will never be
able to fully harness it.
It is a conglomerate of the minds of the
world. Some beautiful and some hideous, but
perhaps one day, unifying.
50. Cultural factors
Negative images
Sexual discriminations
51. Computer games
◦ Designed based on male interests
High school teachers and counselors
◦ Usually influenced by sexual stereotype
◦ Discourage young girls to get involved in
computing
52. False images of computing careers
◦ Nerdy, geeky, antisocial, unfeminine
Computing as a male domain
◦ Advertisements and articles are all male dominated
◦ A PC World article featured 16 men pioneers of PC,
but not a single woman
53. Another major issue
Mostly subconscious
◦ Invisibility
◦ Dirty jokes
◦ Negative stereotype of women
◦ Display of nude/partially nude posters
54. Work with parents, teachers, and counselors
Higher profile for women in computing
◦ More articles written by women
◦ Female representatives at career fairs
Awareness of subtle sexual discrimination
55. Under-representation of women in
computing
◦ Generally caused by stereotype and discrimination
◦ Understand the causes
◦ Try to correct them
56. Automation of several manual process A large increase in
productivity and substantial decrease in costs.
Reduction of Manufacturing Jobs Work load shifted on Robust
Machines with less need of labors.
Financial Engineering Monitoring system in stocks all over the
world
The Return of the Cottage Industry Sole Application Development
Global Communication Better results in import and export business
Financial Transparency Less chances of insecure monetary
Financial Hazards Fraudulent, Spammers, Hackers and Data
insecurity
Enhancement in B2B Processes Out sourcing
Virtual Markets Giving worth to waste objects (E-Commerce)
Project Management Efficient Process Flow Management
Research and Development Make your life better
You are poor if you are not computerized!!!
57. ◦ Millions of people have used Napster software to download
music at no charge and in apparent violation of copyright
laws.
◦ DoubleClick, an advertising network that tracks users as they
move around the Internet, was sued after it revealed plans to
match a mass mailing marketing list with its anonymous
database of Internet users, thus revealing the Web users’
identities.
58. Four parts to the Code:
Interpretation
Principles of the rules
of conduct
Rules of Ethical
conduct rulings
59. Ideal standards of ethical
conduct in philosophical terms
Principles
They are not enforceable.
Minimum standards of ethical
conduct stated as specific rules
Rules of
conduct
They are enforceable.
60. Interpretation of the rules of
conduct by the AICPA Division
Interpretation
of Professional Ethics
of the rules
of conduct They are not enforceable, but a
practitioner must justify departure.
61. Published explanations and answers
to questions about the rules of conduct
submitted to the AICPA by practitioners
Ethical
and others interested in ethical requirements
rulings
They are not enforceable, but a
practitioner must justify departure.
62. 1. Responsibilities
Professionals should exercise sensitive and
moral judgments in all their activities.
2. Public Interest
Members should accept the obligation to act
in a way that will serve and honor the public.
63. 3. Integrity
Members should perform all responsibilities
with integrity to maintain public confidence.
4. Objectivity and Independence
Members should be objective, independent,
and free of conflicts of interest.
64. 5. Due Care
Members should observe the profession’s
standards and strive to improve competence.
6. Scope and Nature of Services
A member in public practice should observe
the Code of Professional Conduct.
65.
66. The technology involving the development,
maintenance, and use of computer systems,
software, and networks for the processing
and distribution of data.
The branch of engineering that deals with the
use of computers and telecommunications to
retrieve and store and transmit information.
67. Computer Science is the systematic
study of algorithmic methods for
representing and transforming
information's, including their:
i. Theory
ii. Design
iii. Implementation
iv. Application
v. Efficiency
68. The process of utilizing computer technology to
complete a task. Computing may involve
computer hardware and/or software, but must
involve some form of a computer system.
Most individuals use some form of computing
every day whether they realize it or not. Swiping
a debit card, sending an email, or using a cell
phone can all be considered forms of
computing.
69. Algorithms and Data Structures
Architecture
Artificial Intelligence and Robotics
Database and Information Retrieval
Human-Computer Communication(GRAPHICS)
Numerical and Symbolic Computation
Operating Systems(NETWORKS)
Programming Languages
Software Methodology and Engineering
70. “Security or protection of Personal Data”.
Need for Info Privacy:
• Medical records
• Financial data,
• Criminal records
• Political records
• Business related information or
• Website data.
Misuse of term “Privacy”.
To security of data against various risks.
To the risks of data being accessed or modified by unauthorized
persons.
To refer only to the security of data during transmission.
71. Information security means protecting
information and information system from
unauthorized access modification or
destruction.
There are three principles about information
security
Confidentiality:
Ensuring that information is accessible
only to those authorized to have access
Integrity:
Safeguarding accuracy completeness and control
of information
Availability:
Ensuring that authorized people have access to
information
72. Deter. Have in place the means to avoid or
prevent the occurrence of preventable
information security breaches.
Protect. Be in a position to safeguard your
information assets from security breaches.
Detect. Equip yourself to rapidly detect the
occurrence of security breaches.
Respond. Be ready to react to rapidly
overcome the effects of security breaches.
Recover. Be able to restore the integrity,
availability and confidentiality of information
assets to their expected state.
73. Professional development is an ongoing process of
assessment and planned actions that provide the opportunity
for:
Maintaining and expanding knowledge and skills based on evidence
Self-reflection about and facilitation of professional core values
Autonomous practice within the context of one’s practice setting
Creating, anticipating, and actively responding to changes in an
evolving health care system
Induction into new responsibilities
Acquisition of contemporary clinical and practice management
knowledge, skills, and abilities
74. Life long is therefore
about:
acquiring and updating all kinds of abilities, interests,
knowledge and
qualifications.
valuing all forms of learning.
Insight into the demand for learning.
Adequate resourcing.
Facilitating access to learning opportunities.
Creating a learning culture
75. Professional competence is the
Habitual and judicious use of communication
Knowledge
Technical skills
Emotions
Value
Reflection in daily practice for the benefit of the individual
and community being served.
76. Cognitive
◦ Core knowledge
◦ Information management
◦ Applying knowledge to real-world situations
◦ Using personal experience Abstract problem-solving
Relationship
◦ Communication skills
◦ Handling conflict
◦ Teamwork
◦ Teaching others (eg, patients, students, and colleagues)
Affective/Moral
Tolerance of ambiguity and anxiety
Emotional intelligence
Habits of Mind
◦ Observations of one's own thinking emotions, and techniques
◦ Attentiveness
◦ Willingness to acknowledge and correct errors
77. The systematic maintenance and
improvement of knowledge, skills, and
abilities through one’s professional career or
working life. Lifelong learning is the ongoing
process by which the quality and relevance of
professional services are maintained.
78. acquiring and updating all kinds of abilities, interests,
knowledge and qualifications.
valuing all forms of learning.
Insight into the demand for learning.
Adequate resourcing.
Facilitating access to learning opportunities.
Creating a learning culture
79. Risks are potential problems that may affect
successful completion of a software project.
Risks involve uncertainty and potential
losses.
79
80. Project risks
◦ threaten the project plan
Technical risks
◦ threaten product quality and the timeliness of
the schedule
Business risks
◦ threaten the viability of the software to be
built (market risks, strategic risks,
management risks, budget risks)
80
81. Known risks
◦ predictable from careful evaluation of current
project plan and those extrapolated from past
project experience
◦ e.g. virus attacks
Unknown risks
◦ some problems will simply occur without warning
81
82. A risk is a potential problem – it might happen and it might not
Conceptual definition of risk:
◦ Risk concerns future happenings
◦ Risk involves change in mind, opinion, actions, places, etc.
◦ Risk involves choice and the uncertainty that choice entails
Two characteristics of risk:
◦ Uncertainty – the risk may or may not happen, that is, there are
no 100% risks (those, instead, are called constraints)
◦ Loss – the risk becomes a reality and unwanted consequences or
losses occur
83. Technical risks :(They Business risks: (They
Project risks: (They
threaten the quality and threaten the viability of
threaten the project
timeliness of the software the software to be
plan).
to be produced). built).
Known risk:(Those risks
that can be uncovered
Unpredictable risks: (are Reactive risk strategies:
after careful evaluation of
extremely difficult to (Don't worry, I'll think of
the project plan)
identify in advance). something).
Predictable risk:(past
turnover).
Steps for Risk
Proactive risk
Management
strategies:(Primary
Develop a contingency
objective is to avoid risk Identify possible risks.
plan .
and to have a analyze each risks.
contingency plan).
84. *Software that we used Daily:
Improving computer Life.
. Microsoft office . Mozilla Firefox . Google
Apps
. Adobe Photoshop . Adobe Acrobat
professional
*Software used in Education.
.Productivity Software . Word Processing Software
.Spreadsheet Software . Educational Software for
Teachers
*Software used in Animation Web & Graphic design ,
VFX & Gaming.
*Software used in Medical Field.
.Med iSOFT Medical Billing Software . Recur Electronic
Prescribing Software . Araxes Electronic Medical Record
Software
Editor's Notes
It refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies.In actuality, information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary.
It refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies.In actuality, information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary.