Professional Documents
Culture Documents
Topic1 Introduction 1
Topic1 Introduction 1
TOPIC 1:
2
OVERVIEW ON
ETHICS AND ETHICAL
ANALYSIS
3
WHAT IS ETHICS?
• Each society forms a set of rules
that establishes the boundaries
of generally accepted
behavior. These rules are often
expressed in statements about
how people should behave,
and they fit together to form the
moral code by which a society
lives
13
Creating an Ethical Work Environment
• Most employees want to perform their jobs
successfully and ethically, but good
employees sometimes make bad ethical
choices.
14
15
16
Creating an Ethical Work Environment
• Employees must have a knowledgeable
resource with whom they can discuss
perceived unethical practices.
17
Ethical Considerations in Decision Making
18
Step 1: Develop a Problem Statement
• A problem statement is a clear, concise description
of the issue that needs to be addressed.
• A good problem statement answers the following
questions:
– What do people observe that causes them to
think there is a problem?
– Who is directly affected by the problem?
– Is there anyone else affected?
– How often does it occur?
– What is the impact of the problem?
– How serious is the problem
19
Step 1: Develop a Problem Statement
• One must gather and analyze facts to develop a
good problem statement.
20
Step 1: Develop a Problem Statement
• Part of developing a good problem statement involves
identifying the stakeholders and their positions on the
issue.
22
Step 2: Identify Alternatives
• During this stage of decision making, it is ideal to
enlist the help of others, including stakeholders, to
identify several alternative solutions to the problem.
• In providing participants information about the
problem to be solved, offer just the facts, without
your opinion, so you don’t influence others to
accept your solution
• During any brainstorming process, try not to be
critical of ideas, as any negative criticism will tend
to “shut down” the group, and the flow of ideas will
dry up.
• Simply write down the ideas as they are suggested.
23
Step 3: Evaluate and Choose an Alternative
24
Four common approaches to ethical decision
making
25
Step 4: Implement Decision
• Once the alternative is selected, it should be
implemented in an efficient, effective, and timely
manner.
• It is imperative that someone whom the
stakeholders trust and respect answer the following
questions:
– Why are we doing this?
– What is wrong with the current way we do things?
– What are the benefits of the new way for you?
• A transition plan must be defined to explain to
people how they will move from the old way of
doing things to the new way.
26
Step 5: Evaluate the Results
• After the solution to the problem has been
implemented, monitor the results to see if
the desired effect was achieved, and
observe its impact on the organization and
the various stakeholders.
– Were the success criteria fully met?
– Were there any unintended consequences?
27
ETHICS IN INFORMATION
TECHNOLOGY
28
ETHICS IN INFORMATION TECHNOLOGY
• Many employees might have their e-mail and
Internet access monitored while at work, as
employers struggle to balance their need to
manage important company assets and work time
with employees’ desire for privacy and self-
direction.
• Millions of people have downloaded music and
movies at no charge and inapparent violation of
copyright laws at tremendous expense to the
owners of those copyrights.
• Organizations contact millions of people worldwide
through unsolicited e-mail (spam) as an extremely
low-cost marketing approach. 29
ETHICS IN INFORMATION TECHNOLOGY
• Hackers break into databases of financial and
retail institutions to steal customer information,
then use it to commit identity theft—opening
new accounts and charging purchases to
unsuspecting victims.
• Students around the world have been caught
downloading material from the Web and
plagiarizing content for their term papers.
• Web sites plant cookies or spyware on visitors’
hard drives to track their online purchases and
activities.
30
AIMS OF THE COURSE
31
Aims of the Course
• Students must also be exposed to the larger societal
context of computing to develop an understanding of
the relevant social, ethical, legal and professional issues.
• Undergraduates also need to understand the basic
cultural, social, legal, and ethical issues inherent in the
discipline of computing.
• Students also need to develop the ability to ask serious
questions about the social impact of computing and to
evaluate proposed answers to those questions.
• Finally, students need to be aware of the basic legal
rights of software and hardware vendors and users, and
they also need to appreciate the ethical values that are
the basis for those rights.
32
Aims of the Course
• As technological advances continue to
significantly, impact the way we live and
work, the critical importance of social issues
and professional practice continues to
increase.
• Much of this course is concerned with how
one decides what to do in situations.
• The topics to be addressed specifically
include:
33
A. SOCIAL CONTEXT
• Computers and the Internet, perhaps more than
any other technologies, have transformed society
over the past 75 years, with dramatic increases in
human productivity;
• an explosion of options for news, entertainment,
and communication;
• Includes fundamental breakthroughs in almost
every branch of science and engineering.
• Social Context provides the foundation for all other
knowledge units, especially Professional Ethics
34
B. ANALYTICAL TOOL
• Ethical theories and principles are the
foundations of ethical analysis because they
are the viewpoints from which guidance
can be obtained along the pathway to a
decision.
• However, in order for an ethical theory to be
useful, the theory must be directed towards
a common set of goals.
• In order to make decisions a basic ability in
ethical argumentation is required.
35
C. Professional Ethics
• Computer ethics is a branch of practical
philosophy that deals with how computing
professionals should make decisions
regarding professional and social conduct.
• There are three primary influences:
– 1) an individual’s own personal code;
– 2) any informal code of ethical behaviour
existing in the workplace; and
– 3) exposure to formal codes of ethics.
36
D. Intellectual Property
• Intellectual Property Intellectual property
refers to a range of intangible rights of
ownership In an asset such as a software
program.
• There are essentially four types of intellectual
property rights relevant to software:
– patents, copyrights, trade secrets and
trademarks.
37
E. PRIVACY AND CIVIL LIBERTIES
• Privacy and Civil Liberties Electronic
information sharing highlights the need to
balance privacy protections with
information access. The ease of digital
access to many types of data makes
privacy rights and civil liberties more
complex, differing among the variety of
cultures worldwide.
38
EXPLORING SOCIAL AND
PROFESSIONAL PRACTICE
ISSUES
39
ACTIVITY
-
40
Activity1: What would you do?
A. Read the following scenarios. Analyze and discuss you answers
comprehensively.
41
Activity1: What would you do?
A. Read the following scenarios. Analyze and discuss you answers
comprehensively.
Scenario 1:
A coworker calls you at 9:00 a.m. at work and asks for a
favor. He is having car trouble and will be an hour late
for work. He explains that he has already been late for
work twice this month and that a third time will cost him
four hours of pay. He asks you to stop by his cubicle, turn
his computer on, and place some papers on the desk so
that it appears that he is in. You have worked on some
small projects with this co-worker and have gone to
lunch together. He seems nice enough and does his
share of the work, but you are not sure what to tell him.
What would you do? 43
References
• Social Issues and Professional Practice in IT & Computing
Lecture Notes (2019). Department of Computer Science
University of Cape Town
• Baase, S. (2013) A Gift of Fire – Social, Legal and Ethical Issues
for Computing and the Internet, 4th Edition
• Reynolds,G. (2010). Ethics in Information Technology 3rd
Edition.
• Internet Sources
– https://www.youtube.com/watch?v=p9A4UHYeBcE
– https://youtu.be/zPsoFhUDLuU
• https://www.youtube.com/watch?app=desktop&v=x6oSJ
g6wuBg&list=TLPQMjMwMTIwMjJtU_M54aziYA&index=3
• https://www.youtube.com/watch?v=IxBVMI2UJS0&t=15s
44
45
46