professionalismandethicalresponsibilities_第1页
professionalismandethicalresponsibilities_第2页
professionalismandethicalresponsibilities_第3页
professionalismandethicalresponsibilities_第4页
professionalismandethicalresponsibilities_第5页
已阅读5页,还剩50页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、professionalism and ethical responsibilitiesnature of professionalismnicole l. mendolerawhat is professionalism?code of ethicscode of ethicslacademic honestyladherence to confidentiality agreementldata privacylhandling of human subjectslimpartiality in data analysislprofessional accountabilitylresol

2、ution of conflicts of interestslsoftware piracyacceptable use policies in the workplaceby: brian jubagroup 2the internet: a valuable resource?advantageslstreamlined time-consuming business tasks.lfaster communication.disadvantagesl distractions at work shopping, pornography, gambling, gamesstats abo

3、ut the workplacel30%-40% of employee internet usage isnt work related.l70% of all web traffic to internet porn sites occurs between 9am and 5pm according to sex tracker.l92% of online stock trading occurs during work hours and 46% of online holiday shopping.company complaintsloss of productivitylmod

4、em connections at home, high speed at work, entices employees to use work connection for “web leisure”.liability from misuseltransferring of sexual images creates a “hostile work environment”.lemails clearly document evidence of discrimination and sexual harassment.lunauthorized access resulting in

5、release of confidential information.company misrepresentationlsystems identify username with affiliation.lmessages and email thought to have come from the company instead of the individual.lemployees shop online and fail to pay for goods.acceptable use policieslused to combat the misuse and ensurepr

6、iorities are on work.lshould be written down.la “living document” able to evolve.loutline “what kind of internet usage is permitted, what kind is not, and the consequences for violating the rules”. sections of a basic policyl“employment is at will” disclaimerlnetwork limitationsstates appropriate an

7、d inappropriate acts.llevel of privacy to be expectedlogging and monitoring.ldamage to resourcesaccess only through firewall. no unauthorized input of data.ldeletion of materialhow does the acm tie in?section 1.4 lmembers should not discriminate.section 1.7 lrespect the privacy of others.section 1.8

8、 lmaintaining confidentialitysection 2.6 lhonor contractual agreementssection 3.3 lcreate policies that support proper use.futurelcontrolling the internet is no longer an it problem. lmitigated itself into a “corporate issue”.lbest dealt by human resources people.la survey of hr people found that mo

9、nitoring employees to make sure they are not wasting time has become an increasing problem.lfinding the appropriate balance between work time and personal time on the internet.lfind a way to increase the bottom line without increasing liability.tools availablelfiltering software laccess policiesllog

10、ging softwareln2h2, surfcontrol, connectotelethical dissent and whistle-blowingmcdonnell douglass dc-10lin 1972: american airlines flight 96 malfunctionnine passenger and two flight attendants were injured.lin 1974: turkish airline flight 981 crashedall 335 passengers and 11 crew members were killed

11、 (the 5th worst aviation disaster in history)lin 1979: american airlines flight 191 crashed275 people were killedlin 1979:air new zealand flight 901 crashedlin 1989: united airlines flight 232 crashed112 of its 296 passengers and crew members were killed.mcdonnell douglass dc-10 contdlthere was mech

12、anical and designing problem in dc-10s cargo doors and employees knew about the problem.lno on blew the whistle!ethical dissent and whistle-blowinglethical dissentnoticing the wrongdoings in the organization and attempting to get them changed within the organization.lwhistle-blowingmaking your disse

13、nt public by going outside the organization.ex) involvement of an unfolding number of agencies, lawyers, legal systems, and public proceedings.whistle-blowinglfirst used in the early 1970s by ralph nader“an act of a man or a woman who believing in the public interest overrides the interest of the or

14、ganization he serves, and publicly blows the whistle if the organization is involved in corrupt, illegal, fraudulent or harmful activity”.the hughes whistle-blowing caselhughes electronics hybrid chipsused in guidance system and other military programs.ex) weapon systems in f-14, f-15, f16 and f-18

15、aircraft.needed to be tested to make sure that they can withstand years of exposure to the extreme environmental hazards they might face.ex) rapid changes in temperature, severe shock, changes in atmospheric pressure, etc.however, the tests were skipped sometimes.the hughes whistle-blowing caselwhis

16、tle-blowersmargaret goodearl and ruth aldredloutcomeon june 15th, 1992, hughes was found guilty of conspiring to defraud the government.in 1996, hughes was assessed 4.05 million for their fraud. goodearl and aldred were awarded $891,000 of this amount (22%). hughes also had to pay the legal fees for

17、 goodearl and aldred ($450,000).the hughes whistle-blowing caselwhy would margaret goodearl blew the whistle?one account quoted goodearl describing her motivation for whistle-blowing as follows:“i had no choice ive got three sons and a daughter, and any one of them could wind up in the military and

18、dead because of these bad parts”.what would you do?major codes of ethicslin fact, the codes of ethics of our professional societies require the professional to blow the whistle in certain circumstances.lexamples:ieee codeacm codeieee-cs/acm software engineering codeaitp standards of conductacm code

19、of ethicslin the work environment the computing professional has the additional obligation to report any signs of system dangers that might result in serious personal or social damage. if ones superiors do not act to curtail or mitigate such dangers, it may be necessary to blow the whistle to help c

20、orrect the problem or reduce the risk. (item 1.2 of the acm code)the decision is yours!various forms of professional credentialingby david hockenberrytwo types of professional credentialing:lcertificationsllicensescertificationslvoluntary process.ladministrated by a professional society or manufactu

21、rer.many computing certifications:lgeneral certified software development program (csdp) administrated by the ieee.lmanufacturer specific microsoft certified application developer (mcad) administrated by microsoftsurvey of certified computing professionals found:value of certification0102030405060ve

22、ry valuablefairly valuablesomewhatvaluablenot valuable% handoutssurvey of certified computing professionals found: (continued)reasons for seeking certification advancement in professionadvancement in currentjobprepare for new jobsecure employmentjob requirementimprove job security assess current exp

23、ertiseincrease compensationattain access to vendorsupport other survey of certified computing professionals found: (continued)0.00%5.00%10.00%15.00%20.00%25.00%more credibility within organizationmore credibility with customersgreater self-esteem solve problems quicker increase in salary primary ach

24、ievements resulting from certificationlicenseslmandatory, legal process.ladministrated by the state or federal government.software engineering licensinglfairly new -first professional software engineer was licensed in 1998 in texas.ladvantages -same as certification.ldisadvantages -can be held legal

25、ly responsible.dealing with harassment and discrimination historylequal pay act of 1963lcivil rights act of 1964, title vii lrehabilitation act of 1973ldisabilities act of 1990 lnineteenth century civil rights acts, 1993ensures equalityspecifies damageslharassment- based on discrimination lawsharass

26、ment-definitionlspeech, actions are workplace harassment if:severe or pervasivecreate a hostile or abusive work environmentbased on race, religion, sex, national origin, age, disability, military membership for the harassed and for a reasonable person. sexual harassmentlmost common type of harassmen

27、tldefinition: any unwanted activity of a sexual nature that affects an individuals employment unwanted touchingunnecessary requests for datescoercive threatslgray arealooks, comments, jokes, nude calendars, etc.other types of harassmentlreligiouscompany newsletterprayeranti-religious talklpolitical/

28、socialpolitical beliefsconstruction workersl“men at work”discrimination-definitionldiscrimination is bias based on race, sex, religion, national origin, physical disability, and age by employers. there is a growing body of law preventing or occasionally justifying employment discrimination based on

29、sexual orientation. discriminatory practices include bias in hiring, promotion, job assignment, termination, compensation, and various types of harassment. types of discriminationlhiringmust give an equal opportunity to those of all religions, races, gendersdisability:lif only reasonable accommodati

30、on is necessary, you cannot discriminateagelmust consider people of any ageaffirmative actionljob assignmentsmust give equal job assignments to employees of same experience/skillcannot promote people of a certain race/gender over otherslpaymust pay all equally experienced and talented employees equa

31、llycannot give more/less money because of gender/racepay gaplstill exists, hopefully will change soondealing with harassmentltrainingmandatory for all employees and managershelps employees to understand what exactly harassment isreduce accidental harassment, increases understanding of itlharassment

32、reporting/staffallows employees to easily report harassmentlmanagerslharassment hotlinelharassment staffhelp remedy situation in best way possiblelpolicieszero tolerance policyamiable solutionlparties meetldiscuss friendly terms, misunderstandingremedieslfiringldocking vacation daysstopping discrimi

33、nationleducationdiscrimination trainingdiversity trainingworking with diverse peoplelreportingsimilar to harassmentinvestigate claimskeep track of employmentstopping discriminationlremedieszero tolerance policyamiable solutionlparties meetldiscuss friendly terms, misunderstandingpunishmentlfiringldocking vacation dayslfalse claimsperceived discriminationno actual discriminationlsit down talk with both partiesfalse claims to make moneylsome remedies against false claimsthe futurelharassment and discrimination will be more prominent in our liveslnew issuessexu

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论