understanding the individual
Ten percent of the grade for this class will come from a report that displays your understanding of the individual in the organization
The purpose of this assignment is to demonstrate your perception of how the individual fits into an organization in terms of identity, ethics, and loyalty.
For this assignment, read the the discussion on the ACM's effort to update its Software Engineering Code of Ethics and think about the draft version in a brief paper (2-5 pages). [or the equivalent of a paper, if you wish. See below.] You may consult additional sources as you wish, but if you do, remember to include the citations in a bibliography at the end of your paper. Your paper will be evaluated according to your analysis of the decisions an individual would have had to have made in the situation described below.
For the first time since 1992, the ACM Code of Ethics and Professional Conduct (the Code) is being updated. The Code Update Task Force in conjunction with the Committee on Professional Ethics is seeking advice from ACM members on the update.
The current draft
The ACM Code of Ethics and Professional Conduct ("the Code") identifies key elements of ethical conduct in computing.
The Code is designed to support all computing professionals, which is taken to mean current or aspiring computing practitioners as well as those who influence their professional development, and those who use technology in an impactful way. The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always a primary consideration. Section 1 outlines fundamental ethical considerations. Section 2 addresses additional, more specific considerations of professional responsibility. Section 3 pertains more specifically to individuals who have a leadership role, whether in the workplace or in a volunteer professional capacity. Commitment to ethical conduct is required of every ACM member and principles involving compliance with the Code are given in Section 4.
The Code as a whole is concerned with how fundamental ethical principles apply to one's conduct as a computing professional. Each principle is supplemented by guidelines, which provide explanations to assist members in understanding and applying it. These extraordinary ethical responsibilities of computing professionals are derived from broadly accepted ethical principles.
The Code is not an algorithm for solving ethical problems, rather it is intended to serve as a basis for ethical decision making in the conduct of professional work. Words and phrases in a code of ethics are subject to varying interpretations, and a particular principle may seem to conflict with other principles in specific situations. Questions related to these kinds of conflicts can best be answered by thoughtful consideration of the fundamental ethical principles, understanding the public good is the paramount consideration. The entire profession benefits when the ethical decision making process is transparent to all stakeholders. In addition, it may serve as a basis for judging the merit of a formal complaint pertaining to a violation of professional ethical standards.
1. General Moral Principles
A computing professional should...
1.1 Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing
This principle concerning the quality of life of all people affirms an obligation to protect fundamental human rights and to respect diversity. An essential aim of computing professionals is to minimize negative consequences of computing, including threats to health, safety, personal security, and privacy. Computing professionals should give consideration to whether the products of their efforts will be used in socially responsible ways, will meet social needs, and will be broadly accessible. They are encouraged to actively contribute to society by engaging in pro bono or volunteer work. When the interests of multiple groups conflict the needs of the least advantaged should be given increased attention and priority.
In addition to a safe social environment, human well-being requires a safe natural environment. Therefore, computing professionals should be alert to, and make others aware of, any potential harm to the local or global environment.
1.2 Avoid harm
In this document, "harm" means negative consequences to any stakeholder, especially when those consequences are significant and unjust. Examples of harm include unjustified death, unjustified loss of information, and unjustified damage to property, reputation, or the environment. This list is not exhaustive.
Well-intended actions, including those that accomplish assigned duties, may unexpectedly lead to harm. In such an event, those responsible are obligated to undo or mitigate the harm as much as possible. Avoiding unintentional harm begins with careful consideration of potential impacts on all those affected by decisions.
To minimize the possibility of indirectly harming others, computing professionals should follow generally accepted best practices for system design, development, and testing. Additionally, the consequences of emergent systems and data aggregation should be carefully analyzed. Those involved with pervasive or infrastructure systems should also consider Principle 3.7.
At work, a computing professional has an additional obligation to report any signs of system risks that might result in serious personal or social harm. If one's superiors do not act to curtail or mitigate such risks, it may be necessary to "blow the whistle" to reduce potential harm. However, capricious or misguided reporting of risks can itself be harmful. Before reporting risks, the computing professional should thoroughly assess all relevant aspects of the incident as outlined in Principle 2.5.
1.3 Be honest and trustworthy
Honesty is an essential component of trust. A computing professional should be fair and not make deliberately false or misleading claims and should provide full disclosure of all pertinent system limitations and potential problems. Fabrication of data, falsification of data, and scientific misconduct are similarly violations of the Code. One who is professionally dishonest is accountable for any resulting harm.
A computing professional should be honest about his or her own qualifications, and about any limitations in competence to complete a task. Computing professionals should be forth-right about any circumstances that might lead to conflicts of interest or otherwise tend to undermine the independence of their judgment.
Membership in volunteer organizations such as ACM may at times place individuals in situations where their statements or actions could be interpreted as carrying the "weight" of a larger group of professionals. An ACM member should exercise care not to misrepresent ACM, or positions and policies of ACM or any ACM units.
1.4 Be fair and take action not to discriminate
The values of equality, tolerance, respect for others, and equal justice govern this principle. Prejudicial discrimination on the basis of age, color, disability, ethnicity, family status, gender identity, military status, national origin, race, religion or belief, sex, sexual orientation, or any other inappropriate factor is an explicit violation of ACM policy. Sexual harassment is a form of discrimination that limits fair access to the spaces where the harassment takes place.
Inequities between different groups of people may result from the use or misuse of information and technology. Technologies should be as inclusive and accessible as possible. Failure to design for inclusiveness and accessibility may constitute unfair discrimination.
1.5 Respect the work required to produce new ideas, inventions, and other creative and computing artifacts
The development of new ideas, inventions, and other creative and computing artifacts creates value for society, and those who expend the effort needed for this should expect to gain value from their work. Computing professionals should therefore provide appropriate credit to the creators of ideas or work. This may be in the form of respecting authorship, copyrights, patents, trade secrets, non-disclosure agreements, license agreements, or other methods of attributing credit where it is due.
Both custom and the law recognize that some exceptions to a creator's control of a work are necessary to facilitate the public good. Computing professionals should not unduly oppose reasonable uses of their intellectual works.
Efforts to help others by contributing time and energy to projects that help society illustrate a positive aspect of this principle. Such efforts include free and open source software and other work put into the public domain. Computing professionals should avoid misappropriation of a commons.
1.6 Respect privacy
"Privacy" is a multi-faceted concept and a computing professional should become conversant in its various definitions and forms.
"Privacy" is a multi-facet concept and a computing professional should become conversant in its various definitions and forms.
Technology enables the collection, monitoring, and exchange of personal information quickly, inexpensively, and often without the knowledge of the people affected. Computing professionals should use personal data only for legitimate ends and without violating the rights of individuals and groups. This requires taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals or groups. Computing professionals should establish procedures that allow individuals to review their personal data, correct inaccuracies, and opt out of automatic data collection.
Only the minimum amount of personal information necessary should be collected in a system. The retention and disposal periods for that information should be clearly defined and enforced, and personal information gathered for a specific purpose should not be used for other purposes without consent of the individual(s). When data collections are merged, computing professionals should take special care for privacy. Individuals may be readily identifiable when several data collections are merged, even though those individuals are not identifiable in any one of those collections in isolation.
1.7 Honor confidentiality
Computing professionals should protect confidentiality unless required to do otherwise by a bona fide requirement of law or by another principle of the Code.
User data observed during the normal duties of system operation and maintenance should be treated with strict confidentiality, except in cases where it is evidence for the violation of law, of organizational regulations, or of the Code. In these cases, the nature or contents of that information should not be disclosed except to appropriate authorities, and the computing professional should consider thoughtfully whether such disclosures are consistent with the Code.
2. Professional Responsibilities
A practicing computing professional should...
2.1 Strive to achieve the highest quality in both the process and products of professional work
Computing professionals should insist on high quality work from themselves and from colleagues. This includes respecting the dignity of employers, colleagues, clients, users, and anyone affected either directly or indirectly by the work. High quality process includes an obligation to keep the client or employer properly informed about progress toward completing that project. Professionals should be cognizant of the serious negative consequences that may result from poor quality and should resist any inducements to neglect this responsibility.
2.2 Maintain high standards of professional competence, conduct, and ethical practice
High quality computing depends on individuals and teams who take personal and organizational responsibility for acquiring and maintaining professional competence. Professional competence starts with technical knowledge and awareness of the social context in which the work may be deployed. Professional competence also requires skill in reflective analysis for recognizing and navigating ethical challenges. Upgrading necessary skills should be ongoing and should include independent study, conferences, seminars, and other informal or formal education. Professional organizations, including ACM, are committed to encouraging and facilitating those activities.
2.3 Know, respect, and apply existing laws pertaining to professional work
ACM members must obey existing regional, national, and international laws unless there is a compelling ethical justification not to do so. Policies and procedures of the organizations in which one participates must also be obeyed, but compliance must be balanced with the recognition that sometimes existing laws and rules are immoral or inappropriate and, therefore, must be challenged. Violation of a law or regulation may be ethical when that law or rule has inadequate moral basis or when it conflicts with another law judged to be more important. If one decides to violate a law or rule because it is unethical, or for any other reason, one must fully accept responsibility for one's actions and for the consequences.
2.4 Accept and provide appropriate professional review
Quality professional work in computing depends on professional reviewing and critiquing. Whenever appropriate, computing professionals should seek and utilize peer and stakeholder review. Computing professionals should also provide constructive, critical review of the work of others.
2.5 Give comprehensive and thorough evaluations of computer systems andtheir impacts, including analysis of possible risks
Computing professionals should strive to be perceptive, thorough, and objective when evaluating, recommending, and presenting system descriptions and alternatives. Computing professionals are in a position of special trust, and therefore have a special responsibility to provide objective, credible evaluations to employers, clients, users, and the public. Extraordinary care should be taken to identify and mitigate potential risks in self-changing systems. Systems whose future risks are unpredictable require frequent reassessment of risk as the system develops or should not be deployed. When providing evaluations the professional must also identify any relevant conflicts of interest, as stated in Principle 1.3.
As noted in the guidance for Principle 1.2 on avoiding harm, any signs of danger from systems should be reported to those who have opportunity and/or responsibility to resolve them. See the guidelines for Principle 1.2 for more details concerning harm, including the reporting of professional violations.
2.6 Accept only those responsibilities for which you have or can obtain the necessary expertise, and honor those commitments
A computing professional has a responsibility to evaluate every potential work assignment. If the professional's evaluation reveals that the project is infeasible, or should not be attempted for other reasons, then the professional should disclose this to the employer or client, and decline to attempt the assignment in its current form.
Once it is decided that a project is feasible and advisable, the professional should make a judgment about whether the project is appropriate to the professional's expertise. If the professional does not currently have the expertise necessary to complete the project the professional should disclose this shortcoming to the employer or client. The client or employer may decide to pursue the project with the professional after time for additional training, to pursue the project with someone else who has the required expertise, or to forego the project.
The major underlying principle here is the obligation to accept personal accountability for professional work. The computing professional's ethical judgment should be the final guide in deciding whether to proceed.
2.7 Improve public understanding of computing, related technologies, and their consequences
Computing professionals have a responsibility to share technical knowledge with the public by creating awareness and encouraging understanding of computing, including the impacts of computer systems, their limitations, their vulnerabilities, and opportunities that they present. This imperative implies an obligation to counter any false views related to computing.
2.8 Access computing and communication resources only when authorized to do so
This principle derives from Principle 1.2 - "Avoid harm to others." No one should access or use another's computer system, software, or data without permission. One should have appropriate approval before using system resources, unless there is an overriding concern for the public good. To support this clause, a computing professional should take appropriate action to secure resources against unauthorized use. Individuals and organizations have the right to restrict access to their systems and data so long as the restrictions are consistent with other principles in the Code (such as Principle 1.4).
3. Professional Leadership Principles
In this section, "leader" means any member of an organization or group who has influence, educational responsibilities, or managerial responsibilities. These principles generally apply to organizations and groups, as well as their leaders.
A computing professional acting as a leader should...
3.1 Ensure that the public good is a central concern during all professional computing work
The needs of people—including users, other people affected directly and indirectly, customers, and colleagues— should always be a central concern in professional computing. Tasks associated with requirements, design, development, testing, validation, deployment, maintenance, end-of-life processes, and disposal should have the public good as an explicit criterion for quality. Computing professionals should keep this focus no matter which methodologies or techniques they use in their practice.
3.2 Articulate, encourage acceptance of, and evaluate fulfillment of the social responsibilities of members of an organization or group
Technical organizations and groups affect the public at large, and their leaders should accept responsibilities to society. Organizational procedures and attitudes oriented toward quality, transparency, and the welfare of society will reduce harm to members of the public and raise awareness of the influence of technology in our lives. Therefore, leaders should encourage full participation in meeting social responsibilities and discourage tendencies to do otherwise.
3.3 Manage personnel and resources to design and build systems that enhance the quality of working life
Leaders are responsible for ensuring that systems enhance, not degrade, the quality of working life. When implementing a system, leaders should consider the personal and professional development, accessibility, physical safety, psychological well-being, and human dignity of all workers. Appropriate human-computer ergonomic standards should be considered in system design and in the workplace.
3.4 Establish appropriate rules for authorized uses of an organization's computing and communication resources and of the information they contain
Leaders should clearly define appropriate and inappropriate uses of organizational computing resources. These rules should be clearly and effectively communicated to those using their computing resources. In addition, leaders should enforce those rules, and take appropriate action when they are violated.
3.5 Articulate, apply, and support policies that protect the dignity of users and others affected by computing systems and related technologies
Dignity is the principle that all humans are due respect. This includes the general public's right to autonomy in day-to-day decisions.
Designing or implementing systems that deliberately or inadvertently violate, or tend to enable the violation of, the dignity or autonomy of individuals or groups is ethically unacceptable. Leaders should verify that systems are designed and implemented to protect dignity.
3.6 Create opportunities for members of the organization and group to learn, respect, and be accountable for the principles, limitations, and impacts of systems
This principle complements Principle 2.7 on public understanding. Educational opportunities are essential to facilitate optimal participation of all organization or group members. Leaders should ensure that opportunities are available to computing professionals to help them improve their knowledge and skills in professionalism, in the practice of ethics, and in their technical specialties, including experiences that familiarize them with the consequences and limitations of particular types of systems. Professionals should know the dangers of oversimplified models, the improbability of anticipating every possible operating condition, the inevitability of software errors, the interactions of systems and the contexts in which they are deployed, and other issues related to the complexity of their profession.
3.7 Recognize when computer systems are becoming integrated into the infrastructure of society, and adopt an appropriate standard of care for those systems and their users
Organizations and groups occasionally develop systems that become an important part of the infrastructure of society. Their leaders have a responsibility to be good stewards of that commons. Part of that stewardship requires that computing professionals monitor the level of integration of their systems into the infrastructure of society. As the level of adoption changes, there are likely to be changes in the ethical responsibilities of the organization. Leaders of important infrastructure services should provide due process with regard to access to these services. Continual monitoring of how society is using a product will allow the organization to remain consistent with their ethical obligations outlined in the principles of the code. Where such standards of care do not exist, there may be a duty to develop them.
4. Compliance with the Code
A computing professional should...
4.1 Uphold, promote, and respect the principles of the Code
The future of computing depends on both technical and ethical excellence. Computing professionals should adhere to the principles expressed in the Code. Each ACM member should encourage and support adherence by all computing professionals. Computing professionals who recognize breaches of the Code should take whatever actions are within their power to resolve the ethical issues they recognize.
4.2 Treat violations of the Code as inconsistent with membership in ACM
If an ACM member does not follow the Code, membership in ACM may be terminated.
This draft code is pretty all inclusive. Respond to it in terms of the following questions.
- You may not be a member of ACM and your future job may not be necessarily encoded as a "computer professional," but is this code meaningful to you and could you live with it as your guidelines? Analyze how you relate to the code and how you think it may apply to you?
- Which of the first three major components seems most relevant to you and to what you think you might be doing in the future? Be specific about which is the most important to you and why you feel it is?
- Each of the first three major components includes a set of subcomponents. As you did with the previous question, state which subprinciple resonates the strongest for you. The subprinciple does not have to be one of the subprinciples within the major group you identified in part 2, but be clear why you feel it is the most relevant to you and to your hoped-for future.
- Finally, analyze the draft Code in its entirety. Is is workable; is it relevant; is it meaningful; is it a good framework for structuring your professional life? What of it would you you use and what of it would you choose to disregard?
Include your answer in a product roughly equivalent to a 2-5 page paper.
You may use any tool you wish to accomplish this task (a document; a PowerPoint presentation; a Prezi presentation; a blog posting; anything)
But do be sure to point the instructor to the where the deliverable may be found (if appropriate, place the deliverable in your Sakai dropbox and tell the instructor when it may be retrieved from the dropbox)
Due by: 2359 hours on Monday, 25 September 2017
|Grade||What it means||What I will be looking for|
|A||Mastery in understanding the individual perspective in terms of identity, ethics, and loyalty at the highest level of attainment that can reasonably be expected||Well written with no grammatical errors, well-articulated discussion of the topic; it shows evidence of your having absorbed all of the key points of the individual module, and that you described them in such quality that one could expect you to teach the module|
|A-||A totally acceptable performance demonstrating an adequate level of understanding the individual in terms of identity, ethics, and loyalty||An insightful discussion of the topic, with no grammatical errors. It is extremely good, but leaves the reader feeling that your understanding of the issues is perhaps a bit less than professionally sophisticated, in terms of depth of analysis.|
|B+||Really good, but perhaps a bit shallower in terms of your understanding one or more of the contexts; you may have a few grammatical issues in your writing; you may not have used relevant examples to explain your points; you may not have fully addressed all the elements requested|
|B||Good, but perhaps a bit shallower in terms of your understanding several variants of the contexts; you may have several grammatical issues in your writing; you may not have used relevant examples to explain your points; you may not have fully addressed all the elements requested; you did not use terminology that we discussed in the module sessions|
|B-||Good, but not as good as it could have been; you may not have fully addressed all the elements requested|
|C+||A marginal performance demonstrating a minimal passing level||OK, in terms of grasping the essentials, but not good in terms of articulating your understanding in a manner that is easy to read and appreciate|
|C||You seem to understand the essential points of the module, but you did not articulate your understanding well enough to do more than the minimum|
|C-||It's time to start wondering if you missed something important, if you misunderstood the task, if you did not understand the key elements|
|D+||This is a warning that you are not currently on the right path; you might need to have a discussion with the instructor about this performance|
|D||There are indications that you were present and that you sort of grasped what we had discussed, but missed the key points to such a degree that you really need to re-group and catch up|
|F||For whatever reasons an unacceptable performance|