SlideShare a Scribd company logo
1 of 84
BS IT Semester 8th



University of Education, Lahore
Ethics can be defined broadly as
a set of moral principles or values.
 Protect an organization and its employees
  from legal action.
 Create an organization that operates
  consistently.
 Provide a livelihood for employees.
 Avoid unfavorable publicity.
 Gain the goodwill of the community.
 Bribes involve providing money,
  property, favors, or anything else of
  value to someone in business or
  government in order to obtain a
  business advantage.
 Gifts are made openly and publicly as
  a gesture of friendship or goodwill
  with no expectation of a future favor
  for the donor.
   Appoint a corporate ethics officer.
   Ethical standards should be set by a board of
    directors.
   Establish a corporate code of conduct.
   Conduct social audits.
   Require employees to take ethics training.
   Include ethical criteria in employee
    appraisal/reward systems.
       A guide that highlights an organization’s key
        ethical issues and identifies the overarching
        values and principles that are important to
        the organization and that can help in
        decision making.
       The code of conduct helps ensure that
        employees:
    ◦     Abide by the law.
    ◦     Follow necessary regulations.
    ◦     Behave in an ethical manner.
   Sample Code of Conduct from
     Proctor and Gamble
1.   Get the facts.
2.   Identify the stakeholders and their positions.
3.   Consider the consequences of your decision.
4.   Weigh various guidelines and principles (Virtue,
     Utilitarian, Fairness, Common Good).
5.   Develop and evaluate options.
6.   Review your decision.
7.   Evaluate the results of your decision.
Approach to Dealing    Principle
with Moral Issues

Virtue Approach        The ethical choice is the one that best reflects
                       moral virtues in ourselves and our community.

Utilitarian Approach   The ethical choice is the one that produces the
                       greatest excess of benefits over harm.

Fairness Approach      The ethical choice is the one that treats
                       everyone the same and does not show
                       favoritism or discrimination.
Common Good            The ethical choice is the one that advances the
Approach               common good.
The increased use of information technology has
 raised many ethical issues for today’s IT
 professional.
 ◦   Licensing of IT professionals
 ◦   Internet communication
 ◦   Intellectual property
 ◦   Employee/employer issues
◦ Today’s workers are subject to the monitoring of
  their e-mail and Internet access while at work, as
  employers and employees struggle to balance the
  need of the employer to manage important company
  assets and employees’ work time versus the
  employees’ desire for privacy and self-direction.
◦ Students around the world have been caught downloading
  material from the Internet and plagiarizing content for their
  term papers.

◦ Hackers engaged in acts of cyberterrorism defaced hundreds
  of Web sites and left hate messages after a collision between a
  United States spy plane and a Chinese jet fighter.
The person’s ethical standards are different
from those of society as a whole.




The person chooses to act selfishly.




In many instances, both reasons exist.
Embezzlers              Con artists            Shoplifters




Most people who commit such acts feel no
remorse when they are apprehended because
their ethical standards differ from those of
society as a whole.
Everybody does it.




If it’s legal, it’s ethical.



Likelihood of discovery and consequences
An ethical dilemma is a situation a
person faces in which a decision must
be made about appropriate behavior.
1. Obtain the relevant facts.




2. Identify the ethical issues from the facts.




3. Determine who is affected.
4. Identify the alternatives available to   the
person who must resolve the dilemma.



5. Identify the likely consequence
of each alternative.




6. Decide the appropriate action.
A staff person has been informed that
 he will work hours without recording
them as hours worked.



Firm policy prohibits this practice.

Another staff person has stated that
this is common practice in the firm.
Is it ethical for the staff person to
work hours and not record them
as hours worked in this situation?



Who is affected?

How are they affected?

What alternatives does the staff
person have?
Our society has attached a special
meaning to the term professional.


A professional is expected to conduct
himself or herself at a higher level
than most other members of society.
Special Responsibilities of IT Professionals
  Maintaining relationships with and responsibilities
   toward customers, clients, coworkers, employees, and
   employers.
  Making critical decisions that have significant
   consequences for many people.
  Determining how to manage, select, or use computers
   in a professional setting.
IT Professionals should
  experts in their field,
  Know customers rely on their knowledge, expertise, and
   honesty,
  Understand their products (and related risks) affect many
   people,
  Follow good professional standards and practices,
  Maintain an expected level of competence and are up-
   to-date on current knowledge and technology, and
  Educate the non-computer professional.
Professional ethics concerns:
 One's conduct of behaviour and practice while doing
  professional work,
 Relations with peers in the work place,
 Conduct of duties towards the employer,
 Obligations towards the customer,
 Responsibility for the future of the profession at large.
 Responsibility for the wellbeing of the society at large.




                                                              24
1. to accept responsibility in making decisions consistent with the safety, health
  and welfare of the public, and to disclose promptly factors that might
  endanger the public or the environment;

2. to avoid real or perceived conflicts of interest whenever possible, and to
   disclose them to affected parties when they do exist;

3. to be honest and realistic in stating claims or estimates based on available
   data;

4. to reject bribery in all its forms;

5. to improve the understanding of technology, its appropriate application, and
   potential consequences;




                                                                                     25
6. to maintain and improve our technical competence and to undertake
   technological tasks for others only if qualified by training or
   experience, or after full disclosure of pertinent limitations;

7. to seek, accept, and offer honest criticism of technical work, to
   acknowledge and correct errors, and to credit properly the
   contributions of others;

8. to treat fairly all persons regardless of such factors as race, religion,
   gender, disability, age, or national origin;

9. to avoid injuring others, their property, reputation, or employment by
   false or malicious action;

10. to assist colleagues and co-workers in their professional
  development and to support them in following this code of ethics.




                                                                               26
A Code of Ethics enables us to:
 Set out the ideals and responsibilities of the profession
 Exert a de facto regulatory effect, protecting both clients and
  professionals
 Improve the profile of the profession
 Motivate and inspire practitioners, by attempting to define their raison
  d'être
 Provide guidance on acceptable conduct
 Raise awareness and consciousness of issues
 Improve quality and consistency




                                            Atilla.Elci@EMU.edu.tr   CmpE 598- 28.03.2006   27
On the other hand, we must also consider:
 Whether the so-called standards are obligatory, or are
  merely an aspiration
 Whether such a code is desirable or feasible
 Whether ethical values are universal or culturally
  relativistic
 The difficulty of providing universal guidance given the
  heterogeneous nature of the profession
 What the point is of specifying responsibilities, given the
  limited regulatory function of a code.




                                     Atilla.Elci@EMU.edu.tr   CmpE 598- 28.03.2006   28
   The social implications of computing is a
    growing topic
   This topic has many subsets
    ◦ Economics, politics, ethics, crime…
   The purpose of studying this topic
    ◦ To create awareness and educate
    ◦ Prevent problems before they occur
    ◦ Work together as a society to understand the issues and
      develop solutions
   Concept of an “information society” came
    about in the early 1960’s
   38 Years for 30 percent of America to own a
    telephone
   7 Years for 30 percent of America to be
    connected to the internet
   In 2000, 55,000 people each day used the
    internet for the first time
   Governments and individuals believe much of
    the information on the Internet is subversive,
    dangerous, or immoral
    ◦ Prime example: pornography
    ◦ In 2001, Spam was eight percent of all emails
    ◦ In 2003, Spam was 40 percent of all emails
   Child Internet Protection Act
   Exchange of information among individuals
    and groups
   Does technology decrease social activity???
   Internet relationships can lead to disaster
    ◦ Lack of authenticity leads to misleading
    ◦ Exploitation of America’s youth by predators
   “Digital technology’s ubiquity and its increasing
    invisibility have the effect of making it appear
    almost natural” (Gene, 198)

   Privacy will become a larger issue

   “In a World Without Secrets, many of the
    secrets we lose are those that we give away
    freely, without thinking, in return for the
    elimination of some small frictions” (Richard,
    256)
   Everyone can converse with anyone.
   Computer networks compress time and space
   However, the physical attributes of a
    conversation are also lost.
   The lost attributes like body language, facial
    expression and tone of voice cannot be
    replaced .
   Users have not replaced but rather
    supplemented the new methods to enhance
    communication.
   Users have develop new ways to express the
    commonly used emotions. ; )
   Email, Instant Messaging
   Both end users know who the other person is
    to some extend.
   Email and IM is like a home address and a
    telephone number.
    ◦ A level of privacy is expected.
    ◦ Users expect to know who and why they are being
      contacted in those mode.
   Mailing Lists, Web Forums, Chat Rooms,
    Internet Relay Chat (IRC)
   All these mode of communication gives the
    user a high level of anonymity. Users are often
    known only by a nickname.
   Users can use different or multiple aliases.
    ◦ Can be use for malicious intend
    ◦ Users gravitate toward a known group of trusted users
   The Internet was envisioned during the arms
    race with Russia.
   It was created in 1969 by the Advanced
    Research Projects Agency (ARPA).
   In 1972, electronic mail was introduced by
    Ray Tomlinson, a computer scientist.
   In 1973, the Transmission Control
    Protocol/Internet Protocol (TCP/IP) is
    designed.
   In 1983 this protocol becomes the standard
    for communicating between computers over
    the Internet.
   Finally, in 1982 the term “Internet” is coined.
   In the beginning, the Internet is simply packet
    switching and emails.
   It is not until 1989 that the Internet becomes
    available to the public and user friendly when
    The World debuts.
   Tim Berners-Lee of CERN (European
    Laboratory for Particle Physics) develops a
    new technique for distributing information on
    the Internet.
   He calls it the World Wide Web.
   The Web is based on hypertext.
   It allows the user to connect from one
    document to another at different sites on the
    Internet through hyperlinks.
   The Web is accessible through a graphical
    user interface (GUI).
   1995 - CompuServe, America Online, and
    Prodigy start providing dial-up Internet
    access.
   1996 - Approximately 45 million people are
    using the Internet, with roughly:
    ◦ 30 million of those in North America (United States
      and Canada)
    ◦ 9 million in Europe
    ◦ 6 million in Asia/Pacific (Australia, Japan, etc.)
   By 1999, the number of Internet users
    worldwide reaches 150 million and more
    than 50% are from the United States.
   “E-commerce” becomes the new buzzword
    as Internet shopping spreads like wildfire.
   In 2000, the never ending flow of fortunes
    coming from Internet is halted.
   Investment capital dries up and the Nasdaq
    stock index plunges
   This causes many dotcom companies to go
    bankrupt.
   In 2001, about 9.8 billion electronic
    messages are sent daily.
   In 2002 of January, 58.5% of the U.S.
    population (164.14 million people) uses the
    Internet. Worldwide there are 544.2 million
    users.
   The Internet has grown rapidly since its birth
    at ARPA.
   It has become a societal standard within
    America.
   We can try to control it, but we will never be
    able to fully harness it.
   It is a conglomerate of the minds of the
    world. Some beautiful and some hideous, but
    perhaps one day, unifying.
Declining number of female computer science
students for the past 20 years
   Cultural factors
   Negative images
   Sexual discriminations
   Computer games
    ◦ Designed based on male interests
   High school teachers and counselors
    ◦ Usually influenced by sexual stereotype
    ◦ Discourage young girls to get involved in
      computing
   False images of computing careers
    ◦ Nerdy, geeky, antisocial, unfeminine
   Computing as a male domain
    ◦ Advertisements and articles are all male dominated
    ◦ A PC World article featured 16 men pioneers of PC,
      but not a single woman
   Another major issue
   Mostly subconscious
    ◦   Invisibility
    ◦   Dirty jokes
    ◦   Negative stereotype of women
    ◦   Display of nude/partially nude posters
   Work with parents, teachers, and counselors
   Higher profile for women in computing
    ◦ More articles written by women
    ◦ Female representatives at career fairs
   Awareness of subtle sexual discrimination
   Under-representation of women in
    computing
    ◦ Generally caused by stereotype and discrimination
    ◦ Understand the causes
    ◦ Try to correct them
   Automation of several manual process  A large increase in
    productivity and substantial decrease in costs.
   Reduction of Manufacturing Jobs  Work load shifted on Robust
    Machines with less need of labors.
   Financial Engineering  Monitoring system in stocks all over the
    world
   The Return of the Cottage Industry  Sole Application Development
   Global Communication  Better results in import and export business
   Financial Transparency  Less chances of insecure monetary
   Financial Hazards  Fraudulent, Spammers, Hackers and Data
    insecurity
   Enhancement in B2B Processes  Out sourcing
   Virtual Markets  Giving worth to waste objects (E-Commerce)
   Project Management  Efficient Process Flow Management
   Research and Development  Make your life better
   You are poor if you are not computerized!!!
◦ Millions of people have used Napster software to download
  music at no charge and in apparent violation of copyright
  laws.

◦ DoubleClick, an advertising network that tracks users as they
  move around the Internet, was sued after it revealed plans to
  match a mass mailing marketing list with its anonymous
  database of Internet users, thus revealing the Web users’
  identities.
Four parts to the Code:

                  Interpretation
Principles        of the rules
                  of conduct




Rules of          Ethical
conduct           rulings
Ideal standards of ethical
             conduct in philosophical terms
Principles
             They are not enforceable.



             Minimum standards of ethical
             conduct stated as specific rules
Rules of
conduct
             They are enforceable.
Interpretation of the rules of
               conduct by the AICPA Division
Interpretation
               of Professional Ethics
of the rules
of conduct     They are not enforceable, but a
               practitioner must justify departure.
Published explanations and answers
          to questions about the rules of conduct
          submitted to the AICPA by practitioners
Ethical
          and others interested in ethical requirements
rulings
          They are not enforceable, but a
          practitioner must justify departure.
1. Responsibilities


 Professionals should exercise sensitive and
   moral judgments in all their activities.
2. Public Interest
Members should accept the obligation to act
in a way that will serve and honor the public.
3. Integrity


Members should perform all responsibilities
with integrity to maintain public confidence.
4. Objectivity and Independence

Members should be objective, independent,
and free of conflicts of interest.
5. Due Care

Members should observe the profession’s
standards and strive to improve competence.




  6. Scope and Nature of Services

  A member in public practice should observe
  the Code of Professional Conduct.
The technology involving the development,
 maintenance, and use of computer systems,
 software, and networks for the processing
 and distribution of data.

The branch of engineering that deals with the
 use of computers and telecommunications to
 retrieve and store and transmit information.
Computer Science is the systematic
         study of algorithmic methods for
           representing and transforming
            information's, including their:
i.     Theory
ii.    Design
iii.   Implementation
iv.    Application
v.     Efficiency
The process of utilizing computer technology to
complete a task. Computing may involve
computer hardware and/or software, but must
involve some form of a computer system.
Most individuals use some form of computing
every day whether they realize it or not. Swiping
a debit card, sending an email, or using a cell
phone can all be considered forms of
computing.
   Algorithms and Data Structures
   Architecture
   Artificial Intelligence and Robotics
   Database and Information Retrieval
   Human-Computer Communication(GRAPHICS)
   Numerical and Symbolic Computation
   Operating Systems(NETWORKS)
   Programming Languages
   Software Methodology and Engineering
“Security or protection of Personal Data”.
Need for Info Privacy:
•   Medical records
•   Financial data,
•   Criminal records
•   Political records
•   Business related information or
•   Website data.
Misuse of term “Privacy”.
   To security of data against various risks.
   To the risks of data being accessed or modified by unauthorized
    persons.
   To refer only to the security of data during transmission.
   Information security means protecting
    information and information system from
    unauthorized access modification or
    destruction.
   There are three principles about information
    security
Confidentiality:
            Ensuring that information is accessible
    only to those authorized to have access
Integrity:
Safeguarding accuracy completeness and control
 of information
Availability:
Ensuring that authorized people have access to
 information
   Deter. Have in place the means to avoid or
    prevent the occurrence of preventable
    information security breaches.
   Protect. Be in a position to safeguard your
    information assets from security breaches.
   Detect. Equip yourself to rapidly detect the
    occurrence of security breaches.
   Respond. Be ready to react to rapidly
    overcome the effects of security breaches.
   Recover. Be able to restore the integrity,
    availability and confidentiality of information
    assets to their expected state.
Professional development is an ongoing process of
assessment and planned actions that provide the opportunity
                                                       for:
Maintaining   and expanding knowledge and skills based on evidence
Self-reflection about and facilitation of professional core values

Autonomous practice within the context of one’s practice setting

Creating, anticipating, and actively responding to changes in an

                        evolving health care system
Induction into new responsibilities

Acquisition of contemporary clinical and practice management

                       knowledge, skills, and abilities
Life long is therefore
    about:
   acquiring and updating all kinds of abilities, interests,
    knowledge and
       qualifications.
   valuing all forms of learning.
   Insight into the demand for learning.
   Adequate resourcing.
   Facilitating access to learning opportunities.
   Creating a learning culture
Professional competence is the
 Habitual and judicious use of communication

 Knowledge

 Technical skills

 Emotions

 Value

 Reflection in daily practice for the benefit of the individual
  and community being served.
   Cognitive
    ◦   Core knowledge
    ◦   Information management
    ◦   Applying knowledge to real-world situations
    ◦   Using personal experience Abstract problem-solving
   Relationship
    ◦   Communication skills
    ◦   Handling conflict
    ◦   Teamwork
    ◦   Teaching others (eg, patients, students, and colleagues)
   Affective/Moral
     Tolerance of ambiguity and anxiety
     Emotional intelligence
   Habits of Mind
    ◦ Observations of one's own thinking emotions, and techniques
    ◦ Attentiveness
    ◦ Willingness to acknowledge and correct errors
   The systematic maintenance and
    improvement of knowledge, skills, and
    abilities through one’s professional career or
    working life. Lifelong learning is the ongoing
    process by which the quality and relevance of
    professional services are maintained.
   acquiring and updating all kinds of abilities, interests,
    knowledge and qualifications.
   valuing all forms of learning.
   Insight into the demand for learning.
   Adequate resourcing.
   Facilitating access to learning opportunities.
   Creating a learning culture
   Risks are potential problems that may affect
    successful completion of a software project.
   Risks involve uncertainty and potential
    losses.




                                                   79
   Project risks
    ◦ threaten the project plan
   Technical risks
    ◦ threaten product quality and the timeliness of
      the schedule
   Business risks
    ◦ threaten the viability of the software to be
      built (market risks, strategic risks,
      management risks, budget risks)



                                                       80
   Known risks
    ◦ predictable from careful evaluation of current
      project plan and those extrapolated from past
      project experience
    ◦ e.g. virus attacks

   Unknown risks
    ◦ some problems will simply occur without warning




                                                        81
   A risk is a potential problem – it might happen and it might not
   Conceptual definition of risk:
    ◦ Risk concerns future happenings
    ◦ Risk involves change in mind, opinion, actions, places, etc.
    ◦ Risk involves choice and the uncertainty that choice entails
   Two characteristics of risk:
    ◦ Uncertainty – the risk may or may not happen, that is, there are
      no 100% risks (those, instead, are called constraints)
    ◦ Loss – the risk becomes a reality and unwanted consequences or
      losses occur
Technical risks :(They        Business risks: (They
   Project risks: (They
                               threaten the quality and     threaten the viability of
  threaten the project
                              timeliness of the software       the software to be
          plan).
                                   to be produced).                  built).


 Known risk:(Those risks
  that can be uncovered
                              Unpredictable risks: (are     Reactive risk strategies:
after careful evaluation of
                               extremely difficult to       (Don't worry, I'll think of
     the project plan)
                                identify in advance).             something).
 Predictable risk:(past
      turnover).

                                    Steps for Risk
     Proactive risk
                                    Management
  strategies:(Primary
                                                            Develop a contingency
objective is to avoid risk       Identify possible risks.
                                                                    plan .
     and to have a                analyze each risks.
   contingency plan).
*Software that we used Daily:
Improving computer Life.
      . Microsoft office    . Mozilla Firefox     . Google
Apps
         . Adobe Photoshop       . Adobe Acrobat
professional
 *Software used in Education.
.Productivity Software      . Word Processing Software
.Spreadsheet Software       . Educational Software for
Teachers
 *Software used in Animation Web & Graphic design ,
VFX & Gaming.
*Software used in Medical Field.
.Med iSOFT Medical Billing Software . Recur Electronic
Prescribing Software . Araxes Electronic Medical Record
Software

More Related Content

What's hot

Ethical dilemmas
Ethical dilemmasEthical dilemmas
Ethical dilemmasDini John.K
 
Workplace ethics
Workplace ethics Workplace ethics
Workplace ethics padma74
 
Business Ethics
Business EthicsBusiness Ethics
Business Ethicspurval
 
Chapter 1- Overview of Ethics
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of EthicsSuji Priya J
 
04 ethical decision making
04 ethical decision making04 ethical decision making
04 ethical decision makingNimantha Perera
 
Unethical Practices
Unethical PracticesUnethical Practices
Unethical PracticesJh Labonno
 
Ethical theories
Ethical theoriesEthical theories
Ethical theoriesklfilbert
 
Model for Ethical Dilemmas
Model for Ethical DilemmasModel for Ethical Dilemmas
Model for Ethical Dilemmasfdaniel1
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Ethical decision making process
Ethical decision making processEthical decision making process
Ethical decision making processAnandu K P
 
Ethical decision making
Ethical decision makingEthical decision making
Ethical decision makingredhouser
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethicsdmeyeravc
 
Intro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral ValuesIntro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral Values Mia Eaker
 
Ethical leadership
Ethical leadershipEthical leadership
Ethical leadershipkdore
 

What's hot (20)

Ethical dilemmas
Ethical dilemmasEthical dilemmas
Ethical dilemmas
 
Workplace ethics
Workplace ethics Workplace ethics
Workplace ethics
 
Business Ethics
Business EthicsBusiness Ethics
Business Ethics
 
Ethical Decision Making in Business
Ethical Decision Making in BusinessEthical Decision Making in Business
Ethical Decision Making in Business
 
Ethics
EthicsEthics
Ethics
 
Chapter 1- Overview of Ethics
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of Ethics
 
04 ethical decision making
04 ethical decision making04 ethical decision making
04 ethical decision making
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Unethical Practices
Unethical PracticesUnethical Practices
Unethical Practices
 
Ethical theories
Ethical theoriesEthical theories
Ethical theories
 
Model for Ethical Dilemmas
Model for Ethical DilemmasModel for Ethical Dilemmas
Model for Ethical Dilemmas
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Ethical decision making process
Ethical decision making processEthical decision making process
Ethical decision making process
 
Ethical decision making
Ethical decision makingEthical decision making
Ethical decision making
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethics
 
Intro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral ValuesIntro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral Values
 
Lecture1 introduction to ethics
Lecture1 introduction to ethicsLecture1 introduction to ethics
Lecture1 introduction to ethics
 
Lecture 9 ethical decision making
Lecture 9 ethical decision makingLecture 9 ethical decision making
Lecture 9 ethical decision making
 
Ethical leadership
Ethical leadershipEthical leadership
Ethical leadership
 
CSR
CSRCSR
CSR
 

Viewers also liked

Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technologySJBennett228
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 

Viewers also liked (6)

Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Similar to Final professional ethics for midterm(1)

Professional ethics and responsibilities
Professional ethics and responsibilitiesProfessional ethics and responsibilities
Professional ethics and responsibilities17221598-012
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsMark Jhon Oxillo
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
Engineering Ethics: Is It Black & White Or Is It Gray?
Engineering Ethics: Is It Black & White Or Is It Gray?Engineering Ethics: Is It Black & White Or Is It Gray?
Engineering Ethics: Is It Black & White Or Is It Gray?Blue Elephant Consulting
 
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETCChapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETCTakshil Gajjar
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
ieee-code-of-ethics.pdf
ieee-code-of-ethics.pdfieee-code-of-ethics.pdf
ieee-code-of-ethics.pdfProfLSrividya
 
Soft Skills 2011 Secretariat of the House of Federation .ppt
Soft Skills 2011 Secretariat of the House of Federation .pptSoft Skills 2011 Secretariat of the House of Federation .ppt
Soft Skills 2011 Secretariat of the House of Federation .pptBetshaTizazu2
 
Guest lecture Sustainable Lens 2014
Guest lecture Sustainable Lens 2014Guest lecture Sustainable Lens 2014
Guest lecture Sustainable Lens 2014Samuel Mann
 
Introduction to management groups g - i - managerial ethics and corporate s...
Introduction to management   groups g - i - managerial ethics and corporate s...Introduction to management   groups g - i - managerial ethics and corporate s...
Introduction to management groups g - i - managerial ethics and corporate s...Diego Thomas
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxbriancrawford30935
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxbalewayalew
 

Similar to Final professional ethics for midterm(1) (20)

Professional ethics and responsibilities
Professional ethics and responsibilitiesProfessional ethics and responsibilities
Professional ethics and responsibilities
 
lecture 1234.ppt
lecture 1234.pptlecture 1234.ppt
lecture 1234.ppt
 
UNIT I.ppt
UNIT I.pptUNIT I.ppt
UNIT I.ppt
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT Professionals
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Engineering Ethics: Is It Black & White Or Is It Gray?
Engineering Ethics: Is It Black & White Or Is It Gray?Engineering Ethics: Is It Black & White Or Is It Gray?
Engineering Ethics: Is It Black & White Or Is It Gray?
 
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETCChapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
Chapter 4 SCOPES AND AIMS OF ENGINEERING ETHICS ETC
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
ieee-code-of-ethics.pdf
ieee-code-of-ethics.pdfieee-code-of-ethics.pdf
ieee-code-of-ethics.pdf
 
Soft Skills 2011 Secretariat of the House of Federation .ppt
Soft Skills 2011 Secretariat of the House of Federation .pptSoft Skills 2011 Secretariat of the House of Federation .ppt
Soft Skills 2011 Secretariat of the House of Federation .ppt
 
Guest lecture Sustainable Lens 2014
Guest lecture Sustainable Lens 2014Guest lecture Sustainable Lens 2014
Guest lecture Sustainable Lens 2014
 
Introduction to management groups g - i - managerial ethics and corporate s...
Introduction to management   groups g - i - managerial ethics and corporate s...Introduction to management   groups g - i - managerial ethics and corporate s...
Introduction to management groups g - i - managerial ethics and corporate s...
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 

Final professional ethics for midterm(1)

  • 1. BS IT Semester 8th University of Education, Lahore
  • 2. Ethics can be defined broadly as a set of moral principles or values.
  • 3.  Protect an organization and its employees from legal action.  Create an organization that operates consistently.  Provide a livelihood for employees.  Avoid unfavorable publicity.  Gain the goodwill of the community.
  • 4.  Bribes involve providing money, property, favors, or anything else of value to someone in business or government in order to obtain a business advantage.  Gifts are made openly and publicly as a gesture of friendship or goodwill with no expectation of a future favor for the donor.
  • 5. Appoint a corporate ethics officer.  Ethical standards should be set by a board of directors.  Establish a corporate code of conduct.  Conduct social audits.  Require employees to take ethics training.  Include ethical criteria in employee appraisal/reward systems.
  • 6. A guide that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and that can help in decision making.  The code of conduct helps ensure that employees: ◦ Abide by the law. ◦ Follow necessary regulations. ◦ Behave in an ethical manner.
  • 7. Sample Code of Conduct from Proctor and Gamble
  • 8. 1. Get the facts. 2. Identify the stakeholders and their positions. 3. Consider the consequences of your decision. 4. Weigh various guidelines and principles (Virtue, Utilitarian, Fairness, Common Good). 5. Develop and evaluate options. 6. Review your decision. 7. Evaluate the results of your decision.
  • 9. Approach to Dealing Principle with Moral Issues Virtue Approach The ethical choice is the one that best reflects moral virtues in ourselves and our community. Utilitarian Approach The ethical choice is the one that produces the greatest excess of benefits over harm. Fairness Approach The ethical choice is the one that treats everyone the same and does not show favoritism or discrimination. Common Good The ethical choice is the one that advances the Approach common good.
  • 10. The increased use of information technology has raised many ethical issues for today’s IT professional. ◦ Licensing of IT professionals ◦ Internet communication ◦ Intellectual property ◦ Employee/employer issues
  • 11. ◦ Today’s workers are subject to the monitoring of their e-mail and Internet access while at work, as employers and employees struggle to balance the need of the employer to manage important company assets and employees’ work time versus the employees’ desire for privacy and self-direction.
  • 12. ◦ Students around the world have been caught downloading material from the Internet and plagiarizing content for their term papers. ◦ Hackers engaged in acts of cyberterrorism defaced hundreds of Web sites and left hate messages after a collision between a United States spy plane and a Chinese jet fighter.
  • 13. The person’s ethical standards are different from those of society as a whole. The person chooses to act selfishly. In many instances, both reasons exist.
  • 14. Embezzlers Con artists Shoplifters Most people who commit such acts feel no remorse when they are apprehended because their ethical standards differ from those of society as a whole.
  • 15. Everybody does it. If it’s legal, it’s ethical. Likelihood of discovery and consequences
  • 16. An ethical dilemma is a situation a person faces in which a decision must be made about appropriate behavior.
  • 17. 1. Obtain the relevant facts. 2. Identify the ethical issues from the facts. 3. Determine who is affected.
  • 18. 4. Identify the alternatives available to the person who must resolve the dilemma. 5. Identify the likely consequence of each alternative. 6. Decide the appropriate action.
  • 19. A staff person has been informed that he will work hours without recording them as hours worked. Firm policy prohibits this practice. Another staff person has stated that this is common practice in the firm.
  • 20. Is it ethical for the staff person to work hours and not record them as hours worked in this situation? Who is affected? How are they affected? What alternatives does the staff person have?
  • 21. Our society has attached a special meaning to the term professional. A professional is expected to conduct himself or herself at a higher level than most other members of society.
  • 22. Special Responsibilities of IT Professionals  Maintaining relationships with and responsibilities toward customers, clients, coworkers, employees, and employers.  Making critical decisions that have significant consequences for many people.  Determining how to manage, select, or use computers in a professional setting.
  • 23. IT Professionals should  experts in their field,  Know customers rely on their knowledge, expertise, and honesty,  Understand their products (and related risks) affect many people,  Follow good professional standards and practices,  Maintain an expected level of competence and are up- to-date on current knowledge and technology, and  Educate the non-computer professional.
  • 24. Professional ethics concerns:  One's conduct of behaviour and practice while doing professional work,  Relations with peers in the work place,  Conduct of duties towards the employer,  Obligations towards the customer,  Responsibility for the future of the profession at large.  Responsibility for the wellbeing of the society at large. 24
  • 25. 1. to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment; 2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist; 3. to be honest and realistic in stating claims or estimates based on available data; 4. to reject bribery in all its forms; 5. to improve the understanding of technology, its appropriate application, and potential consequences; 25
  • 26. 6. to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations; 7. to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others; 8. to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin; 9. to avoid injuring others, their property, reputation, or employment by false or malicious action; 10. to assist colleagues and co-workers in their professional development and to support them in following this code of ethics. 26
  • 27. A Code of Ethics enables us to:  Set out the ideals and responsibilities of the profession  Exert a de facto regulatory effect, protecting both clients and professionals  Improve the profile of the profession  Motivate and inspire practitioners, by attempting to define their raison d'être  Provide guidance on acceptable conduct  Raise awareness and consciousness of issues  Improve quality and consistency Atilla.Elci@EMU.edu.tr CmpE 598- 28.03.2006 27
  • 28. On the other hand, we must also consider:  Whether the so-called standards are obligatory, or are merely an aspiration  Whether such a code is desirable or feasible  Whether ethical values are universal or culturally relativistic  The difficulty of providing universal guidance given the heterogeneous nature of the profession  What the point is of specifying responsibilities, given the limited regulatory function of a code. Atilla.Elci@EMU.edu.tr CmpE 598- 28.03.2006 28
  • 29.
  • 30. The social implications of computing is a growing topic  This topic has many subsets ◦ Economics, politics, ethics, crime…  The purpose of studying this topic ◦ To create awareness and educate ◦ Prevent problems before they occur ◦ Work together as a society to understand the issues and develop solutions
  • 31. Concept of an “information society” came about in the early 1960’s  38 Years for 30 percent of America to own a telephone  7 Years for 30 percent of America to be connected to the internet  In 2000, 55,000 people each day used the internet for the first time
  • 32. Governments and individuals believe much of the information on the Internet is subversive, dangerous, or immoral ◦ Prime example: pornography ◦ In 2001, Spam was eight percent of all emails ◦ In 2003, Spam was 40 percent of all emails  Child Internet Protection Act
  • 33. Exchange of information among individuals and groups  Does technology decrease social activity???  Internet relationships can lead to disaster ◦ Lack of authenticity leads to misleading ◦ Exploitation of America’s youth by predators
  • 34. “Digital technology’s ubiquity and its increasing invisibility have the effect of making it appear almost natural” (Gene, 198)  Privacy will become a larger issue  “In a World Without Secrets, many of the secrets we lose are those that we give away freely, without thinking, in return for the elimination of some small frictions” (Richard, 256)
  • 35.
  • 36. Everyone can converse with anyone.  Computer networks compress time and space  However, the physical attributes of a conversation are also lost.
  • 37. The lost attributes like body language, facial expression and tone of voice cannot be replaced .  Users have not replaced but rather supplemented the new methods to enhance communication.  Users have develop new ways to express the commonly used emotions. ; )
  • 38. Email, Instant Messaging  Both end users know who the other person is to some extend.  Email and IM is like a home address and a telephone number. ◦ A level of privacy is expected. ◦ Users expect to know who and why they are being contacted in those mode.
  • 39. Mailing Lists, Web Forums, Chat Rooms, Internet Relay Chat (IRC)  All these mode of communication gives the user a high level of anonymity. Users are often known only by a nickname.  Users can use different or multiple aliases. ◦ Can be use for malicious intend ◦ Users gravitate toward a known group of trusted users
  • 40. The Internet was envisioned during the arms race with Russia.  It was created in 1969 by the Advanced Research Projects Agency (ARPA).  In 1972, electronic mail was introduced by Ray Tomlinson, a computer scientist.
  • 41. In 1973, the Transmission Control Protocol/Internet Protocol (TCP/IP) is designed.  In 1983 this protocol becomes the standard for communicating between computers over the Internet.  Finally, in 1982 the term “Internet” is coined.
  • 42. In the beginning, the Internet is simply packet switching and emails.  It is not until 1989 that the Internet becomes available to the public and user friendly when The World debuts.  Tim Berners-Lee of CERN (European Laboratory for Particle Physics) develops a new technique for distributing information on the Internet.
  • 43. He calls it the World Wide Web.  The Web is based on hypertext.  It allows the user to connect from one document to another at different sites on the Internet through hyperlinks.  The Web is accessible through a graphical user interface (GUI).
  • 44. 1995 - CompuServe, America Online, and Prodigy start providing dial-up Internet access.  1996 - Approximately 45 million people are using the Internet, with roughly: ◦ 30 million of those in North America (United States and Canada) ◦ 9 million in Europe ◦ 6 million in Asia/Pacific (Australia, Japan, etc.)
  • 45. By 1999, the number of Internet users worldwide reaches 150 million and more than 50% are from the United States.  “E-commerce” becomes the new buzzword as Internet shopping spreads like wildfire.
  • 46. In 2000, the never ending flow of fortunes coming from Internet is halted.  Investment capital dries up and the Nasdaq stock index plunges  This causes many dotcom companies to go bankrupt.
  • 47. In 2001, about 9.8 billion electronic messages are sent daily.  In 2002 of January, 58.5% of the U.S. population (164.14 million people) uses the Internet. Worldwide there are 544.2 million users.
  • 48. The Internet has grown rapidly since its birth at ARPA.  It has become a societal standard within America.  We can try to control it, but we will never be able to fully harness it.  It is a conglomerate of the minds of the world. Some beautiful and some hideous, but perhaps one day, unifying.
  • 49. Declining number of female computer science students for the past 20 years
  • 50. Cultural factors  Negative images  Sexual discriminations
  • 51. Computer games ◦ Designed based on male interests  High school teachers and counselors ◦ Usually influenced by sexual stereotype ◦ Discourage young girls to get involved in computing
  • 52. False images of computing careers ◦ Nerdy, geeky, antisocial, unfeminine  Computing as a male domain ◦ Advertisements and articles are all male dominated ◦ A PC World article featured 16 men pioneers of PC, but not a single woman
  • 53. Another major issue  Mostly subconscious ◦ Invisibility ◦ Dirty jokes ◦ Negative stereotype of women ◦ Display of nude/partially nude posters
  • 54. Work with parents, teachers, and counselors  Higher profile for women in computing ◦ More articles written by women ◦ Female representatives at career fairs  Awareness of subtle sexual discrimination
  • 55. Under-representation of women in computing ◦ Generally caused by stereotype and discrimination ◦ Understand the causes ◦ Try to correct them
  • 56. Automation of several manual process  A large increase in productivity and substantial decrease in costs.  Reduction of Manufacturing Jobs  Work load shifted on Robust Machines with less need of labors.  Financial Engineering  Monitoring system in stocks all over the world  The Return of the Cottage Industry  Sole Application Development  Global Communication  Better results in import and export business  Financial Transparency  Less chances of insecure monetary  Financial Hazards  Fraudulent, Spammers, Hackers and Data insecurity  Enhancement in B2B Processes  Out sourcing  Virtual Markets  Giving worth to waste objects (E-Commerce)  Project Management  Efficient Process Flow Management  Research and Development  Make your life better  You are poor if you are not computerized!!!
  • 57. ◦ Millions of people have used Napster software to download music at no charge and in apparent violation of copyright laws. ◦ DoubleClick, an advertising network that tracks users as they move around the Internet, was sued after it revealed plans to match a mass mailing marketing list with its anonymous database of Internet users, thus revealing the Web users’ identities.
  • 58. Four parts to the Code: Interpretation Principles of the rules of conduct Rules of Ethical conduct rulings
  • 59. Ideal standards of ethical conduct in philosophical terms Principles They are not enforceable. Minimum standards of ethical conduct stated as specific rules Rules of conduct They are enforceable.
  • 60. Interpretation of the rules of conduct by the AICPA Division Interpretation of Professional Ethics of the rules of conduct They are not enforceable, but a practitioner must justify departure.
  • 61. Published explanations and answers to questions about the rules of conduct submitted to the AICPA by practitioners Ethical and others interested in ethical requirements rulings They are not enforceable, but a practitioner must justify departure.
  • 62. 1. Responsibilities Professionals should exercise sensitive and moral judgments in all their activities. 2. Public Interest Members should accept the obligation to act in a way that will serve and honor the public.
  • 63. 3. Integrity Members should perform all responsibilities with integrity to maintain public confidence. 4. Objectivity and Independence Members should be objective, independent, and free of conflicts of interest.
  • 64. 5. Due Care Members should observe the profession’s standards and strive to improve competence. 6. Scope and Nature of Services A member in public practice should observe the Code of Professional Conduct.
  • 65.
  • 66. The technology involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data. The branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information.
  • 67. Computer Science is the systematic study of algorithmic methods for representing and transforming information's, including their: i. Theory ii. Design iii. Implementation iv. Application v. Efficiency
  • 68. The process of utilizing computer technology to complete a task. Computing may involve computer hardware and/or software, but must involve some form of a computer system. Most individuals use some form of computing every day whether they realize it or not. Swiping a debit card, sending an email, or using a cell phone can all be considered forms of computing.
  • 69. Algorithms and Data Structures  Architecture  Artificial Intelligence and Robotics  Database and Information Retrieval  Human-Computer Communication(GRAPHICS)  Numerical and Symbolic Computation  Operating Systems(NETWORKS)  Programming Languages  Software Methodology and Engineering
  • 70. “Security or protection of Personal Data”. Need for Info Privacy: • Medical records • Financial data, • Criminal records • Political records • Business related information or • Website data. Misuse of term “Privacy”.  To security of data against various risks.  To the risks of data being accessed or modified by unauthorized persons.  To refer only to the security of data during transmission.
  • 71. Information security means protecting information and information system from unauthorized access modification or destruction.  There are three principles about information security Confidentiality: Ensuring that information is accessible only to those authorized to have access Integrity: Safeguarding accuracy completeness and control of information Availability: Ensuring that authorized people have access to information
  • 72. Deter. Have in place the means to avoid or prevent the occurrence of preventable information security breaches.  Protect. Be in a position to safeguard your information assets from security breaches.  Detect. Equip yourself to rapidly detect the occurrence of security breaches.  Respond. Be ready to react to rapidly overcome the effects of security breaches.  Recover. Be able to restore the integrity, availability and confidentiality of information assets to their expected state.
  • 73. Professional development is an ongoing process of assessment and planned actions that provide the opportunity for: Maintaining and expanding knowledge and skills based on evidence Self-reflection about and facilitation of professional core values Autonomous practice within the context of one’s practice setting Creating, anticipating, and actively responding to changes in an evolving health care system Induction into new responsibilities Acquisition of contemporary clinical and practice management knowledge, skills, and abilities
  • 74. Life long is therefore about:  acquiring and updating all kinds of abilities, interests, knowledge and qualifications.  valuing all forms of learning.  Insight into the demand for learning.  Adequate resourcing.  Facilitating access to learning opportunities.  Creating a learning culture
  • 75. Professional competence is the  Habitual and judicious use of communication  Knowledge  Technical skills  Emotions  Value  Reflection in daily practice for the benefit of the individual and community being served.
  • 76. Cognitive ◦ Core knowledge ◦ Information management ◦ Applying knowledge to real-world situations ◦ Using personal experience Abstract problem-solving  Relationship ◦ Communication skills ◦ Handling conflict ◦ Teamwork ◦ Teaching others (eg, patients, students, and colleagues)  Affective/Moral  Tolerance of ambiguity and anxiety  Emotional intelligence  Habits of Mind ◦ Observations of one's own thinking emotions, and techniques ◦ Attentiveness ◦ Willingness to acknowledge and correct errors
  • 77. The systematic maintenance and improvement of knowledge, skills, and abilities through one’s professional career or working life. Lifelong learning is the ongoing process by which the quality and relevance of professional services are maintained.
  • 78. acquiring and updating all kinds of abilities, interests, knowledge and qualifications.  valuing all forms of learning.  Insight into the demand for learning.  Adequate resourcing.  Facilitating access to learning opportunities.  Creating a learning culture
  • 79. Risks are potential problems that may affect successful completion of a software project.  Risks involve uncertainty and potential losses. 79
  • 80. Project risks ◦ threaten the project plan  Technical risks ◦ threaten product quality and the timeliness of the schedule  Business risks ◦ threaten the viability of the software to be built (market risks, strategic risks, management risks, budget risks) 80
  • 81. Known risks ◦ predictable from careful evaluation of current project plan and those extrapolated from past project experience ◦ e.g. virus attacks  Unknown risks ◦ some problems will simply occur without warning 81
  • 82. A risk is a potential problem – it might happen and it might not  Conceptual definition of risk: ◦ Risk concerns future happenings ◦ Risk involves change in mind, opinion, actions, places, etc. ◦ Risk involves choice and the uncertainty that choice entails  Two characteristics of risk: ◦ Uncertainty – the risk may or may not happen, that is, there are no 100% risks (those, instead, are called constraints) ◦ Loss – the risk becomes a reality and unwanted consequences or losses occur
  • 83. Technical risks :(They Business risks: (They Project risks: (They threaten the quality and threaten the viability of threaten the project timeliness of the software the software to be plan). to be produced). built). Known risk:(Those risks that can be uncovered Unpredictable risks: (are Reactive risk strategies: after careful evaluation of extremely difficult to (Don't worry, I'll think of the project plan) identify in advance). something). Predictable risk:(past turnover). Steps for Risk Proactive risk Management strategies:(Primary Develop a contingency objective is to avoid risk Identify possible risks. plan . and to have a analyze each risks. contingency plan).
  • 84. *Software that we used Daily: Improving computer Life. . Microsoft office . Mozilla Firefox . Google Apps . Adobe Photoshop . Adobe Acrobat professional *Software used in Education. .Productivity Software . Word Processing Software .Spreadsheet Software . Educational Software for Teachers *Software used in Animation Web & Graphic design , VFX & Gaming. *Software used in Medical Field. .Med iSOFT Medical Billing Software . Recur Electronic Prescribing Software . Araxes Electronic Medical Record Software

Editor's Notes

  1. It refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies.In actuality, information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary.
  2. It refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies.In actuality, information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary.