Chapter 5 IT, Culture and The Society

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 65

CHAPTER 5

I.T., CULTURE, AND


THE SOCIETY
CHAPTER 5 | I.T., CULTURE, AND THE SOCIETY
L E A R N I N G O B J E C T I V ES

01 02 03
Recall the current Discuss the Internet of Explain automation
trends in the field of Things and its influence on and its impact on the
information the society society
technology

04 05 06
Analyze how IT influences Enumerate the rules of
Describe cyberbullying and
culture and social behavior netiquette
identify the steps to combat it

07
Familiarize themselves with and
demonstrate the imperatives of
professional conduct for I.T.
professionals
01
THE IMPACT OF
I.T. ON THE
SOCIETY
THE IMPACT OF IT ON THE SOCIETY
As previously discussed, the seven major trends for 2017 are as follows:
1. IoT and smart home technology
2. Augmented reality and virtual reality
3. Machine learning
4. Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand
Majority of organizations and companies nowadays have taken these trends into
account, shifting manual business processes to automated ones and using ICT to
improve their products and services. Among these seven trends, the internet of Things
(IoT) and automation seem to have greatly influenced present-day culture and society;
thus, it is imperative to discuss these thrusts in detail.
02
INTERNET OF
THINGS (IoT)
INTERNET OF THINGS (IoT)
Internet of Things (IoT) is a set-up of devices and objects which are
connected together in a given network. Their connection, often
wirelessly, is possible using both hardware and software.

The hardware part is often made up of sensors that collect data, which
are then sent to other devices for analysis and possible interpretation.
Popular examples are health wearable devices such as step counters
that are connected to a mobile phone via Bluetooth. An app installed in
the phone records the results in a daily, weekly, or monthly basis for
the mobile phone user to keep track of his or her progress.
2.1. Capabilities of IoT
A major requirement for IoT is a strong internet connection, as all devices must be able
to communicate with one another for the upload and download of needed data. But aside
from connectivity, IoT should also be capable of the following (Mattern & Floerkemeier):

1. Integration across technology and business


Sensors can be used to help improve business processes, such as machines used for
manufacturing and production, security systems, and even simple ones like automatically
turning on and off a light switch. Obviously, technology used for each application may vary,
depending on the complexity and use. Software used to interpret incoming data and sending
commands to the hardware must also be taken into account. Add to that the different
protocols and standards used for connecting, such as Wi-Fi, Bluetooth, etc. An IoT platform
must capable of integrating all of these so that the data may be used efficiently to improve
productivity and even make predictions for optimum system performance.
2.1. Capabilities of IoT
2. Data analysis and synchronization
IoT should be capable of providing analytics help organizations in their decision-
making. However, for this to be effective, data must be synchronized to allow integration
with all of the business aspects, including top management, operations, and even customer
relations (Markkula, 2016).

3. Security and service


With all of these devices being used and all of these data being collected, a major
concern is obviously security. To improve security, IoT devices are usually divided into
networks and each network has a different network access, some more restricted than others,
without compromising connection and system integration. A typical example is your mobile
phone notifying you if you will allow a new device to connect to it via Bluetooth. Normally,
it will ask for a pairing connection via a simple 'accept' or using a more secure line such as a
pin code.
2.2. Applications of IoT
With improved business processes and employee productivity, it is only natural for
organizations to adopt IoT. In a study conducted by IOT Analytics, it was found that most of
the 1,600 lot projects are applied in cities (Scully, 2018).

Topping the list are as follows:

1. Smart cities
Smart cities have adopted IoT in traffic management, waste disposal, and even
community monitoring for the security of the city's residents.

2. Connected industries
The oil and gas industry is identified as one of the front-runners for loT connectivity
which includes remote access to heavy equipment and machinery, from manufacturing to
production.
2.2. Applications of IoT

3. Connected buildings
Connected building projects involve facility automation to reduce energy costs.

4. Connected cars
With smart cities adopting IoT for their traffic management, it is no longer surprising
for the latest car models to be equipped with sensors and network connectivity. Majority of
projects relating to smart vehicles revolve around vehicle diagnostics and monitoring.

5. Smart energy
Majority of smart energy projects focus on developing smart grids for renewable energy
and infrastructure.
2.3. Challenges of IoT
But while things may look good using loT, there are issues raised in adopting it fully.
Texas Instruments, Inc. (2016) has identified six challenges in its implementation:

1. System requirements
Industries normally identify different requirements, especially depending on the type of
industry they belong to. Those in the food industry may require monitoring of perishable
goods, from production and packaging to shipping. An automobile manufacturer may have
the same process, but since products are different, requirements may also change. Food will
require data regarding temperature levels, whereas cars will require mechanical precision.

2. Connectivity
With the varying connections-wired and wireless, as well as the different protocols
governing each connection, it will be a challenge to come up with an IoT project concerning
such protocols.
2.3. Challenges of IoT
3. Power requirements
IoT devices need to run on batteries as majority of these devices are mobile. The
challenge, therefore, is how to extend the battery life on such devices, especially those used
in critical procedures, such as health, disaster management, and safety.

4. Security
One of the most highlighted issues in the application of loT is data security.
Confidential information such as patients' records or employees' profiles are considered at
risk. Security also includes system integrity, with malicious acts such as hacking and viruses
proliferating online.

5. Development
The task of creating loT projects may seem daunting, so one of the challenges
identified is how to expand the capabilities of developers, and not just experts, in order to
create more "smart things."
2.3. Challenges of IoT

6. Services
With data collected from IoT, it is important as well to determine where all this will go
and to identify the platform in which these IoT applications will be placed. Nowadays, cloud
services offer end-to-end solutions to a number of IoT projects.
03
AUTOMATION
AUTOMATION
With the available technology and standards for computer system
interconnection, the demand for system automation is on the rise.
Colloquially called "computerization," having an automated system
means automated business processes, operations, service provider,
monitoring, and even tools.
With the use of computer systems hardware, software, or both the
typical cumbersome and error-prone procedures have become
automated.
AUTOMATION

Examples include an automated payroll system, in which the employee payroll


and pay slips are automatically generated every payday; a manufacturing plant that
packs powdered juices in foil containers/sachets where machines with sensors are used
to fill up the packs up to the last milligram accurately; and even an automated weather
forecast. With the introduction of cloud-computing, a growing number of organizations
have gone into automation because of less cost and minimal server maintenance. There
are two of the common methods in implementing IT automation:
3.1. Robotic Process Automation (RPA)

The Institute for Robotic Process Automation and Artificial Intelligence (IRPAAI)
defined robotic process automation (RPA) as "the application of technology that allows
employees in a company to configure computer software or a "robot" to capture and interpret
existing applications for processing a transaction, manipulating data, triggering responses
and communicating with other digital systems" (Institute for Robotic Process Automation &
Artificial Intelligence, 2018, para. 3). While some may think of "robots" similar to those seen
in movies, RPA actually focuses on computers being able to make logical decisions on the
business process so that their human counterparts can focus on other tasks, thus increasing
work productivity. This may not necessarily translate into hardware. Application systems and
software may also be considered as RPA as they are applicable to the following:
3.1. Robotic Process Automation (RPA)
• Process Automation
The use not only of industrial robots but also of "presentation-layer automation
software" is capable of carrying out the daily operations of an organization. Process
automation may include finance systems such as payroll, customer management systems
such as online system registration, and academic institutions offering online enrollment
systems, among others.
A school that has a learning management system will be helpful for both the students
and the teacher, especially in submitting requirements such as a homework research. The
typical manual procedure for students submitting their homework will be, to come to class,
wait for the teacher, and submit their papers personally. Automating the system requires the
students to simply login to their school website, open their individual account for the current
semester, search the subject they need access to, and upload their assignments at the comfort
of their homes.
3.1. Robotic Process Automation (RPA)

• IT Support Management
Management of IT infrastructure and complex systems becomes easier using RPA. If
part of the system fails, an automated system can immediately send notifications to the IT
manager and technical support staff, informing them of the problem. Large buildings, for
example, employ an automated emergency system, so if an emergency exit door has been
opened, or a fire alarm goes off, the system will automatically detect the exact location of the
opened door or activated alarm, as the location of the emergency will typically be assumed to
be near that point.
3.1. Robotic Process Automation (RPA)
• Automated Assistants
Apple's Siri is an example of a voice recognition software used in RPAS. Instead of
machine language (binary), computers will be able to understand human language and
interact with the same. Another example for automated assistants will be banks having an
automated customer service hotline. Customers call the bank, and instead of a human
operator, an automated assistant will respond asking for details such as service choices,
account numbers, etc. Customers will use their phone's touch keys to enter choices and
numbers while the computer interprets them as input data. After processing, a computer
generated report, such as account balances and other information will be provided.
3.2. Sensors
Sensors are hardware devices that have the capability to measure an event, object, or
any physical quality that is happening. Examples include the heart rate of a person while
jogging, the temperature of a room, brightness of a light source, and the like. Sensors have
the capacity to connect to other devices that can keep track of the data they are measuring. A
mobile phone can be connected to a heart rate sensor to record and monitor a person's health
on a weekly or monthly basis. A web application can be accessed to monitor and control the
CCTV operation of a house or building. These sensors can be connected to a network, in
various ways as explained earlier. However, there are several types of sensors, and with
technology made available today, almost all of these hardware can now be automated.
Sensors can be classified as analog or digital, but below is a list of sensors used in
automation:
3.1. Robotic Process Automation (RPA)
• Temperature sensor
This sensor is capable of measuring temperature as well as detecting its rise or fall. This is
helpful in systems that are temperature-sensitive such as power plants and server rooms.
• Infrared (IR) sensor
This sensor often used for security purposes detects infrared light. It is commonly used along
with an infrared light source. You might have seen it in movies in which a villain trying to access a
restricted area would avoid crossing a series of IR sensors shown as beams of red lines. Breaking
or crossing the beam of red line would trigger an alarm.
• Ultrasonic sensor
An ultrasonic sensor detects sound waves, such as how radars and sonars pick up sounds. A
typical application is a light fixture turning on if the owner claps his or her hands, and turning off
once he or she claps again.
3.2. Sensors
• Touch sensor
Through touch, the sensor activates itself and becomes capable of doing its function. The
latest versions of Samsung and Apple smartphones now have a one-touch login to access the
device, instead of a pin code or a pattern. Combining a touch sensor with biometrics, users can now
access the content of their phones with just a single touch on the home button.
• Proximity sensor
This sensor is able to detect objects within a certain range, even if the object is not physically
touching the sensor yet. It is typically used in the light fixtures of houses and buildings. The light
turns on if it detects a person is close by. This helps save on electricity as well as secure the
premises.
• Pressure sensor
A pressure sensor helps determine the weight or impact of a certain object. It is normally
used by manufacturing companies, such as automobile companies, in designing their airbag
system. They need to create an airbag that is strong enough to cushion a driver upon a head-on
collision, but not too strong to injure him or her due to the recoil.
3.2. Sensors
• Level sensor
This sensor can detect the level of liquids, fluids, grainy or granular materials, such as
powders, etc. Level sensors are used for disaster risk management systems, such as a flood
monitoring system. Level sensors are used to determine if a flooded street will be passable by light
vehicles or not.
• Smoke/Gas sensor
This sensor is used to detect the presence of dangerous fumes such as carbon monoxide
caused by fire. Smoke alarms show how this sensor works.

With these technologies made available, it is easy for big industries, small companies,
and even private individuals to use them. Besides, the design and implementation of these
technologies have become cheaper, much simpler, and more manageable. Thus, the concern
now is not how to use this technology but the correct way of using it.
04
THE INFLUENCE OF
I.T. ON CULTURE AND
SOCIAL BEHAVIOR
THE INFLUENCE OF I.T. ON
CULTURE AND SOCIAL
BEHAVIOR
With the prevalence of technology getting widespread, there are issues, both positive
and negative, that surface. In Chapter 1, the positive and negative effects that ICT
brings to individuals, organizations, and society are discussed. But regardless of
whether the effect is positive or negative, the sudden surge of ICT has created an
influence on how people's lives have been changed, for better and for worse.
However, it is important to note that any positive effect a person wants to see should
not rely solely on the technology; it should also focus on self-realization and social
interaction.
THE INFLUENCE OF I.T. ON CULTURE AND SOCIAL BEHAVIOR
Formerly called the "texting-capital of the world" due to the high number of SMS being
sent and received on a daily basis, the Philippines is now dubbed as the "most social nation"
in a 2015 study conducted by Opera Mini. The study identified that mobile phone users in the
Philippines access social media more than any other sites. In Opera Mini's top 50-user
countries worldwide, the Philippines ranked first with an 86% page-view. With smartphones
becoming cheaper and more accessible, people get to spend more time online, wherever and
whenever they want to due to its mobility. The smartphone adoption rate has grown from
41% to 55% in a span of one year with Android as the most popular OS. The study also
found that Filipinos view on average, 699 web pages per month. That is close to 23 pages
viewed per day.
However, with this type of technological progress, it is observed that the attitude and
behavior of people, not just Filipinos, are evolving to meet technology's evolution. For
example, the invention of the telephone in 1800s paved the way for long-distance
communication.
THE INFLUENCE OF I.T. ON CULTURE AND SOCIAL BEHAVIOR

It created a behavior for people to stay at home and call someone instead of going to the
other person's house and have a face-to-face conversation. Fast forward to 2017, people call
each other on their mobile phones just to ask what they want to eat for lunch. With the
invention of cars and other modes of transportation, humans have created a culture of how
they do commuting, the concept of carpooling, and even the options of where to spend
vacations. It is the same with the introduction of technology and the internet. The fast paced
evolution of mobile technology and the internet has greatly changed how people perceived
communication. In previous chapters, it is mentioned how online commerce started on the
web, but later on evolved into a mobile platform, revolutionizing the way customers buy
products and services.
THE INFLUENCE OF I.T. ON CULTURE AND SOCIAL BEHAVIOR

Gilkey (2015) identified in his article the many hundreds of small ways that technology
alters individual and collective behavior on a daily basis. It may not be noticed, but these
"small ways" are slowly becoming prominent which is probably why the so-called
"generation wars" are now becoming popular (i.e., Baby Boomers vs. Gen X vs. Millennials)
with the obvious disparity between these generations publicized in social media.
05
INFLUENCE ON
CULTURE
3.5.1. Online Reviews
With the proliferation of online information, it is easy to find details on a certain movie
or a book. However, with sites such as Rotten Tomatoes, one can actually make a decision on
what movie to watch simply by reading the "reviews" of other people. If the review is
"good," then the person might watch the movie. But if the review is "bad," then he or she
might consider other movies. This trend of having other people do the task first for others
watching the full movie and informing people online if the film is worth watching or not-is
an example of how technology affects the basic human behavior of decision-making.

3.5.2. Weblogging/Social Media


Nowadays, food bloggers post pictures of their meals in restaurants along with a food
review. This trend created a culture of people dining with friends or family without actually
interacting with them. People would first take pictures of their meal and post it online.
Others, during the course of the meal, would even use their phones to update their online
status instead of talking to the other people in their group. This is one typical example of
technology, in the form of weblogging and social media, affecting social interaction.
3.5.3. YouTube Learners
YouTube is one of the most popular social media sites. People can watch videos,
comment on them, and upload their own videos, among others. Thus, YouTube serves as a
source of videos with people searching for almost about anything online from trivial topics to
more serious subject matter. This fact influences the acquisition of knowledge and learning of
certain skill sets. Instead of reading books or listening to their teacher's class lecture, students
would rather watch YouTube to learn the lesson. Again, this is another situation in which
technology affects the culture, this time, of learning.
06
INFLUENCE ON
SOCIAL BEHAVIOR
3.6.1. Cyberbullying
Behavioral choices especially of teenagers or adolescents are influenced by technologies.
Cyberbullying, for example, is a serious phenomenon brought about by social media.
Cyberbullying is an unwanted, hostile behavior done by individuals to other people in
the hope of gaining control over them. Cyberbullies can be classmates, neighbors, or
officemates. Victims of bullying often end up with personal traumas. And since the act of
bullying is done online, the attackers may also be individuals you do not know as they hide
behind their internet profiles.
An internet profile, also called an internet identity, online identity, or internet persona, is
a profile created by internet users to establish their social identity in online communities, social
media sites, and other websites. Because some consider an online identity to be a possible
breach in privacy, this has led to the creation of an online "mask," an online profile created
through a series of questions (username, gender, age, etc.). However, this "mask" may lead to a
misdirection, or in a worse case, to misinformation. For example, while a handle or username
"student2006" may mean that the user is a student, "2006" may mean either the user's year of
birth or year of entering school.
3.6.1. Cyberbullying
Unfortunately, some internet profiles are created to intentionally mislead or misinform
people. In the previous example, it is possible that the username is randomly created and it is
not at all related to the user's real identity. Choosing a gender also gives the user the option to
either be a boy or a girl. Setting the birthdate online gives the person the option to either be
younger or older especially since Facebook requires its users to be at least 13 years of age
before they can create an account. Registering someone who is 13 years and below on their
behalf is also not allowed and is considered to be a violation of their terms and conditions
(Facebook, 2018). However, again, one can indicate any age and continue using Facebook
when he or she is below the minimum age requirement. This misdirection or misinformation
may have dangerous consequences, which is why it is important to follow the netiquette rule
on personalizing I.T.
The internet profile, be it true or misleading, apparently gives people the confidence they
would not normally have if they are in a face-to-face confrontation. A seemingly innocent
picture, for instance, or a grammatically wrong post may be criticized or bashed.
3.6.1. Cyberbullying

Cyberbullying comes in the form of messages or images, such as memes. Since messages
or images can be posted anonymously, it is hard and oftentimes, difficult to trace the source. It
becomes more problematic if the message or image gets re-posted and distributed quickly
online, or goes "viral." Finding the original post might prove to be even harder.
Victims of cyberbullying may experience the same trauma as a real-life bullying victim.
The difference, however, is that cyberbullying is on a much larger scale. Defending oneself
from this kind of attack is difficult as most of the cyberbullies use internet personas which, as
previously discussed, may be real or not. Even their actual location may be difficult to trace.
The good news is that the society-communities and the government are devising ways to
stop bullying - be it digital or otherwise. As discussed in the previous chapter, the Philippines
has identified several laws, including the Cyber Crime Prevention Act, also known as R.A.
10175, to help catch cyberbullies.
3.6.1. Cyberbullying

But, ultimately, in order to prevent cyberbullying from happening, individuals especially


the youth are encouraged to talk to their families and friends in case they experiencing such a
situation online. Involving parents and teachers in young individuals' social media activities
such as adding them to Facebook may help, if not, stop cyberbullying as they can also see any
untoward incidents happening to these youngsters while online (Prevent Cyberbullying, 2017).
3.6.2. Netiquette

Netiquette is a combination of the words internet and etiquette. It describes how one
should act online. Netiquette brings in policies for all the features and qualities of the internet,
including the use of the World Wide Web (WWW), email services, File Transfer Protocol
(FTP), chat rooms, and instant messaging. There are different types of netiquette implemented
all over the world.
3.6.2.1. Netiquette for Social Media

The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and others is neither
a bad habit nor a good habit in one's personal life. Using social media is good for easy
communication with friends and even long-lost friends and relatives. But there are some netizens
who use their social media accounts to discredit other people by posting or shouting ruthless words
about a particular person or sharing a status that maligns one's character or reputation. Some of the
rules of netiquette for social media are as follows (Spira, 2010):
• The Personalize IT Rule.
Make sure to put restrictions in accepting friends or followers on your social media (e.g.,
Facebook, Twitter, Instagram, LinkedIn). It is not about having the most number of followers or
friends. What matters is who you interact with and how you interact with them.
3.6.2.1. Netiquette for Social Media

• The Off-limits Rule.


Know your limitations when voicing out your opinions on different subjects or topics
concerning your school, religion, personal information, workplace, and even some
controversial subjects such as politics. Knowing your limitations can save you from dire
consequences later on.

• The Tag You're It Rule.


Be careful in tagging someone either in your status post or photos. You may also restrict
someone from tagging you in their posts and photos. Always think of your safety, as well as
others' personal boundaries.
3.6.2.2. Netiquette for Email
Services, Chat Rooms, and
Instant Messaging
Email services such as sending and
receiving an email from someone (professional to
personal) anywhere in the world are used in
numerous contexts. Shown in the figure are some
guidelines in composing an email.
3.6.2.3. Netiquette for Chat Rooms and Instant Messaging

Joining chat rooms and sending instant messages, although mandatory in social
media, have become a trend for users. This is especially beneficial for people working in
different places such as a person working overseas while his or her friend or relative is in
the Philippines. Instead of spending for telcom services, the person just needs internet
connection.
Still, there are guidelines for using instant messaging applications. For instance,
someone might interrupt and request you to accept him or her or to be connected to your
account without your knowing who that person really is.
3.6.2.3. Netiquette for Chat Rooms and Instant Messaging

1. Think long and hard before accepting a private conversation, especially with someone
not on your friends list. Not everyone online may be as they seem to be.
2. In a group chat, include only those that are in your friends list.
3. If possible, do not give your personal information while chatting, including your
photos or "selfies."
4. When in doubt, save a copy or make a back-up of your conversation (chat).
5. You must log out from your account at all times, especially if you are in a public
place, such as a computer shop.
6. You may opt to customize your account settings from public to private account.
3.6.3. Professional Ethics

While netiquette applies to all netizens, I.T. professionals specifically follow an


ethical practice as they are the front liners, support, and backend of ICT.
The Association of Computing Machinery (ACM) has identified 24 imperatives of
professional conduct for IT professionals. It contains many, but not all, issues I.T.
professionals are likely to face while using, creating, and implementing ICT.
Section 1 outlines the fundamental ethical considerations while Section 2 provides
additional, more specific considerations of professional conduct. Section 3 is intended
specifically for individuals who have a leadership role, whether in the workplace or in a
volunteer capacity such as in organizations like ACM. Principles involving compliance
with this Code are laid out in Section 4.
3.6.3. Professional Ethics
1. GENERAL MORAL IMPERATIVES

As an ACM member, I will....

1.1 Contribute to society and human well-being.


This principle concerning the quality of life of all people affirms an obligation to protect
fundamental human rights and to respect the diversity of all cultures. An essential aim of
computing professionals is to minimize negative consequences of computing systems, including
threats to health and safety. When designing or implementing systems, computing professionals
must attempt to ensure that the products of their efforts will be used in socially responsible ways,
will meet social needs, and will avoid harmful effects on health and welfare.
In addition to a safe social environment, human well-being includes a safe natural
environment. Therefore, computing professionals who design and develop systems must be alert
to, and make others aware of, any potential damage to the local or global environment.
3.6.3. Professional Ethics
1.2 Avoid harm to others.
"Harm" means injury or negative consequences, such as undesirable loss of information,
loss of property, property damage, or unwanted environmental impacts. This principle prohibits
use of computing technology in ways that result in harm to any of the following: users, the
general public, employees, and employers. Harmful actions include intentional destruction or
modification of files and programs leading to serious loss of resources or unnecessary
expenditure of human resources such as the time and effort required to purge systems of
"computer viruses."
Well-intended actions, including those that accomplish assigned duties, may lead to harm
unexpectedly. In such an event, the responsible person or persons are obligated to undo or
mitigate the negative consequences as much as possible. One way to avoid unintentional harm is
to carefully consider potential impacts on all those affected by decisions made during design and
implementation.
3.6.3. Professional Ethics
1.2 Avoid harm to others.
To minimize the possibility of indirectly harming others, computing professionals must
minimize malfunctions by following generally accepted standards for system design and testing.
Furthermore, it is often necessary to assess the social consequences of systems to project the
likelihood of any serious harm to others. If system features are misrepresented to users, co-
workers, or supervisors, the individual computing professional is responsible for any resulting
injury.
In the work environment, the computing professional has the additional obligation to report
any signs of system dangers that might result in serious personal or social damage. If one's
superiors do not act to curtail or mitigate such dangers, it may be necessary to "blow the whistle"
to help correct the problem or reduce the risk.
However, capricious or misguided reporting of violations can, itself, be harmful. Before
reporting violations, all relevant aspects of the incident must be thoroughly assessed. In
particular, the assessment of risk and responsibility must be credible. It is suggested that advice
be sought from other computing professionals. See principle 2.5 regarding thorough evaluations.
3.6.3. Professional Ethics

1.3 Be honest and trustworthy.


Honesty is an essential component of trust. Without trust an organization cannot function
effectively. The honest computing professional will not make deliberately false or deceptive
claims about a system or system design, but will instead provide full disclosure of all pertinent
system limitations and problems. A computer professional has a duty to be honest about his or
her own qualifications, and about any circumstances that might lead to conflicts of interest.
Membership in volunteer organizations such as ACM may at times place individuals in
situations where their statements or actions could be interpreted as carrying the "weight" of a
larger group of professionals. An ACM member will exercise care to not misrepresent ACM or
positions and policies of ACM or any ACM units.
3.6.3. Professional Ethics
1.4 Be fair and take action not to discriminate.
The values of equality, tolerance, respect for others, and the principles of equal justice
govern this imperative. Discrimination on the basis of race, sex, religion, age, disability, national
origin, or other such factors is an explicit violation of ACM policy and will not be tolerated.
Inequities between different groups of people may result from the use or misuse of information
and technology. In a fair society, all individuals would have equal opportunity to participate in, or
benefit from, the use of computer resources regardless of race, sex, religion, age, disability,
national origin, or other such similar factors. However, these ideals do not justify unauthorized use
of computer resources nor do they provide an adequate basis for violation of any other ethical
imperatives of this code.

1.5 Honor property rights including copyrights and patent.


Violation of copyrights, patents, trade secrets, and the terms of license agreements is
prohibited by law in most circumstances. Even when software is not so protected, such violations
are contrary to professional behavior. Copies of software should be made only with proper
authorization. Unauthorized duplication of materials must not be condoned.
3.6.3. Professional Ethics
1.6 Give proper credit for intellectual property.
Computing professionals are obligated to protect the integrity of intellectual property.
Specifically, one must not take credit for other's ideas or work, even in cases where the work has
not been explicitly protected by copyright, patent, etc.

1.7 Respect the privacy of others.


Computing and communication technology enables the collection and exchange of personal
information on a scale unprecedented in the history of civilization. Thus, there is increased potential for
violating the privacy of individuals and groups. It is the responsibility of professionals to maintain the
privacy and integrity of data describing individuals. This includes taking precautions to ensure the
accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to
inappropriate individuals.
Furthermore, procedures must be established to allow individuals to review their records and
correct inaccuracies. This imperative implies that only the necessary amount of personal information be
collected in a system, that retention and disposal periods for that information be clearly defined and
enforced, and that personal information gathered for a specific purpose not be used for other purposes
without consent of the individual(s).
3.6.3. Professional Ethics
1.7 Respect the privacy of others.
These principles apply to electronic communications, including electronic mail, and prohibit
procedures that capture or monitor electronic user data, including messages, without the
permission of users or bona fide authorization related to system operation and maintenance. User
data observed during the normal duties of system operation and maintenance must be treated with
strictest confidentiality, except in cases where it is evidence for the violation of law, organizational
regulations, or this Code. In these cases, the nature or contents of that information must be
disclosed only to proper authorities.

1.8 Honor confidentiality.


The principle of honesty extends to issues of confidentiality of information whenever one
has made an explicit promise to honor confidentiality or, implicitly, when private information not
directly related to the performance of one's duties becomes available. The ethical concern is to
respect all obligations of confidentiality to employers, clients, and users unless discharged from
such obligations by requirements of the law or other principles of this Code.
3.6.3. Professional Ethics
2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES

As an ACM computing professional, I will....

2.1 Strive to achieve the highest quality, effectiveness and dignity in both the process and
products of professional work.
Excellence is perhaps the most important obligation of a professional. The computing
professional must strive to achieve quality and to be cognizant of the serious negative
consequences that may result from poor quality in a system.

2.2 Acquire and maintain professional competence.


Excellence depends on individuals who take responsibility for acquiring and maintaining
professional competence. A professional must participate in setting standards for appropriate
levels of competence, and strive to achieve those standards. Upgrading technical knowledge and
competence can be achieved in several ways: doing independent study; attending seminars,
conferences, or courses; and being involved in professional organizations.
3.6.3. Professional Ethics
2.3 Know and respect existing laws pertaining to professional work.
ACM members must obey existing local, state, provincial, national, and international laws
unless there is a compelling ethical basis not to do so. Policies and procedures of the organizations
in which one participates must also be obeyed. But compliance must be balanced with the
recognition that sometimes existing laws and rules may be immoral or inappropriate and,
therefore, must be challenged. Violation of a law or regulation may be ethical when that law or
rule has inadequate moral basis or when it conflicts with another law judged to be more important.
If one decides to violate a law or rule because it is viewed as unethical, or for any other reason,
one must fully accept responsibility for one's actions and for the consequences.

2.4 Accept and provide appropriate professional review.


Quality professional work, especially in the computing profession, depends on professional
reviewing and critiquing. Whenever appropriate, individual members should seek and utilize peer
review as well as provide critical review of the work of others.
3.6.3. Professional Ethics

2.5 Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.
Computer professionals must strive to be perceptive, thorough, and objective when
evaluating, recommending, and presenting system descriptions and alternatives. Computer
professionals are in a position of special trust, and therefore have a special responsibility to
provide objective, credible evaluations to employers, clients, users, and the public. When
providing evaluations, the professional must also identify any relevant conflicts of interest, as
stated in imperative 1.3.
As noted in the discussion of principle 1.2 on avoiding harm, any signs of danger from
systems must be reported to those who have opportunity and/ or responsibility to resolve them.
See the guidelines for imperative 1.2 for more details concerning harm, including the reporting of
professional violations.
3.6.3. Professional Ethics
2.6 Honor contracts, responsibilities. and assigned agreements.
Honoring one's commitments is a matter of integrity and honesty. For the computer
professional, this includes ensuring that system elements perform as intended. Also, when one
contracts for work with another party, one has an obligation to keep that party properly informed
about progress toward completing that work.
A computing professional has a responsibility to request a change in any assignment that he
or she feels cannot be completed as defined. Only after serious consideration and with full
disclosure of risks and concerns to the employer or client, should one accept the assignment. The
major underlying principle here is the obligation to accept personal accountability for professional
work. On some occasions, other ethical principles may take greater priority.
A judgment that a specific assignment should not be performed may not be accepted. Having
clearly identified one's concerns and reasons for that judgment, but failing to procure a change in
that assignment, one may yet be obligated, by contract or by law, to proceed as directed.
3.6.3. Professional Ethics

2.6 Honor contracts, responsibilities. and assigned agreements.


The computing professional's ethical judgment should be the final guide in deciding whether
or not to proceed. Regardless of the decision, one must accept the responsibility for the
consequences.
However, performing assignments "against one's own judgment" does not relieve the
professional of responsibility for any negative consequences.

2.7 Improve public understanding of computing and its consequences.


Computing professionals have a responsibility to share technical knowledge with the public
by encouraging understanding of computing, including the impacts of computer systems and their
limitations. This imperative implies an obligation to counter any false views related to computing.
3.6.3. Professional Ethics

2.8 Access computing and communication resources only when authorized to do so.
Theft or destruction of tangible and electronic property is prohibited by imperative
1.2-"Avoid harm to others." Trespassing and unauthorized use of a computer or communication
system is addressed by this imperative. Trespassing includes accessing communication networks
and computer systems, or accounts and/or files associated with those systems, without explicit
authorization to do so. Individuals and organizations have the right to restrict access to their
systems so long as they do not violate the discrimination principle (see 1.4). No one should enter
or use another's computer system, software, or data files without permission. One must always
have appropriate approval before using system resources, including communication ports, file
space, other system peripherals, and computer time.
3.6.3. Professional Ethics
3. ORGANIZATIONAL LEADERSHIP IMPERATIVES
As an ACM member and an organizational leader.

I will....

BACKGROUND NOTE: This section draws extensively from the draft IFIP Code of Ethics,
especially its sections on organizational ethics and international concerns. The ethical obligations
of organizations tend to be neglected in most codes of professional conduct, perhaps because these
codes are written from the perspective of the individual member. This dilemma is addressed by
stating these imperatives from the perspective of the organizational leader. In this context "leader"
is viewed as any organizational member who has leadership or educational responsibilities. These
imperatives generally may apply to organizations as well as their leaders. In this context
"organizations" are corporations, government agencies. and other "employers," as well as
volunteer professional organizations.
3.6.3. Professional Ethics

3. ORGANIZATIONAL LEADERSHIP IMPERATIVES


As an ACM member and an organizational leader, I will....

3.1 Articulate social responsibilities of members of an organizational unit and encourage full
acceptance of those responsibilities.
Because organizations of all kinds have impacts on the public, they must accept
responsibilities to society. Organizational procedures and attitudes oriented toward quality and the
welfare of society will reduce harm to members of the public, thereby serving public interest and
fulfilling social responsibility. Therefore, organizational leaders must encourage full participation
in meeting social responsibilities as well as quality performance.
3.6.3. Professional Ethics
3.2 Manage personnel and resources to design and build information systems that enhance
the quality of working life.
Organizational leaders are responsible for ensuring that computer systems enhance, not
degrade, the quality of working life. When implementing a computer system, organizations must
consider the personal and professional development, physical safety, and human dignity of all
workers. Appropriate human-computer ergonomic standards should be considered in system
design and in the workplace.

3.3 Acknowledge and support proper and authorized uses of an organization's computing
and communication resources.
Because computer systems can become tools to harm as well as to benefit an organization,
the leadership has the responsibility to clearly define appropriate and inappropriate uses of
organizational computing resources. While the number and scope of such rules should be minimal,
they should be fully enforced when established.
3.6.3. Professional Ethics

3.4 Ensure that users and those who will be affected by a system have their needs clearly
articulated during the assessment and design of requirements; later, the system must be
validated to meet requirements.
Current system users, potential users, and other persons whose lives may be affected by a
system must have their needs assessed and incorporated in the statement of requirements System
validation should ensure compliance with those requirements.

3.5 Articulate and support policies that protect the dignity of users and others affected by a
computing system.
Designing or implementing systems that deliberately or inadvertently demean individuals or
groups is ethically unacceptable. Computer professionals who are in decision-making positions
should verify that systems are designed and implemented to protect personal privacy and enhance
personal dignity.
3.6.3. Professional Ethics

3.6 Create opportunities for members of the organization to learn the principles and
limitations of computer systems.
This complements the imperative on public understanding (2.7). Educational opportunities
are essential to facilitate optimal participation of all organizational members. Opportunities must
be available to all members to help them improve their knowledge and skills in computing,
including courses that familiarize them with the consequences. and limitations of particular types
of systems. In particular, professionals must be made aware of the dangers of building systems
around oversimplified models, the improbability of anticipating and designing for every possible
operating condition, and other issues related to the complexity of this profession.
3.6.3. Professional Ethics
4. COMPLIANCE WITH THE CODE

As an ACM member, I will ....

4.1 Uphold and promote the principles of this Code.

The future of the computing profession depends on both technical and ethical excellence.
Not only is it important for ACM computing professionals to adhere to the principles expressed in
this Code, each member should encourage and support adherence by other members.
3.6.3. Professional Ethics
4.2. Treat violations of this code as inconsistent with membership in the ACM.
Adherence of professionals to a code of ethics is largely a voluntary matter. However, if a
member does not follow this code by engaging in gross misconduct, membership in ACM may be
terminated.
This Code and the supplemental Guidelines were developed by the Task Force for the
Revision of the ACM Code of Ethics and Professional Conduct: Ronald E. Anderson, Chair,
Gerald Engel, Donald Gotterbarn, Grace C. Hertlein, Alex Hoffman, Bruce Jawer, Deborah G.
Johnson, Doris K. Lidtke, Joyce Currie Little, Dianne Martin, Donn B. Parker, Judith A. Perrolle,
and Richard S. Rosenberg. The Task Force was organized by ACM/SIGCAS and funding was
provided by the ACM SIG Discretionary Fund. This Code and the supplemental Guidelines were
adopted by the ACM Council on October 16, 1992.
This Code may be published without permission as long as it is not changed in any way and
it carries the copyright notice. Copyright 1997, Association for Computing Machinery, Inc.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy