Ethics Presented by: Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas.

Slides:



Advertisements
Similar presentations
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Advertisements

Licensure and Engineering Ethics Lecture # 2
Engineering Ethics* What is engineering ethics?
ENGINEERING ETHICS in 3D ENGINEERING ETHICS in 3D Gene Moriarty Department of Electrical Engineering San Jose State University.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Introduction to the Ethics of Engineering Introduction to Mechanical Engineering The University of Texas-Pan American College of Science and Engineering.
ECE Department Florida Institute of Technology Short course in Engineering Ethics (Presented as a part of ECE 4242) Spring 2009.
Silicon Prairie Initiative on Robotics in Information Technology
Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 – Seminar Term 062 Dr. Aiman El-Maleh.
(computer) Ethics CMPT Ethics and Morality Morality and ethics have same roots and meaning: Mores means manner and customs in Latin Ethos (ΗΘ0Σ)
Software Engineering Code Of Ethics And Professional Practice
1 SPIRIT Day 9 Thursday July 19, Announcements Attendance check, making up sessions policies (NG)) 0915“Popsicle Stick Electronics” (Elliott Ostler)
1 SPIRIT Silicon Prairie Initiative on Robotics in Information Technology Engineering Ethics.
What Is Computer Ethics?
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07.
Engineering Ethics.
Ethics Lecture Dr. Christina Howe
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Schechner Ethics and Design Ethics1 פרק 5 : אתיקה בהנדסה 5.1הקוד האתי של IEEE 25.הקוד.
Computer Ethics for Computer Users
Professional Ethics: Should Software Engineers Adhere to a Professional Code of Conduct? Jonathan Schiff CS 301.
S OFTWARE E NGINEERING C ODE O F E THICS A ND P ROFESSIONAL P RACTICE Software Engineering Ethics and Professional Practices © 1999 by the Institute of.
Are computer professionals special?. Do Computer Professionals Have Special Responsibilities? Gotterbarn (1999) believes that because software engineers.
2014 SPE Engineering and Professionalism Committee.
Ethics Jonathan J. Makela Based on material from P. Scott Carney, T. Galvin, J. P. Makela, and the National Ethics Center.
Do computer scientists need a code of ethics like the ACM code? “Seek not the answers, but to understand the questions.” Do computer scientists need a.
Computer Ethics Adapted From: King Fahd University of Petroleum & Minerals Computer Engineering Department Adapted From: King Fahd University of Petroleum.
COMPUTER ETHICS Do you know the difference between right and wrong?
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics. What is the basis for moral criticism? A well thought-out code of ethics All engineering societies have promulgated a version of a code of ethics.
Engineering Ethics ENGR 300 Dept. of Computer Science and Engineering
Cosc 4765 Ethics and security. Security Computer security crosses over legal and ethics lines in many places. –Hacking is pretty much always illegal.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Ethical considerations for Bionic Eyes Dr Kate Fox In conjunction with Dr Frederic Gilbert (UTas)
Engineering Ethics. Engineering Ethics ( II ) Wael. A. Moustafa MA.Sc., P.Eng. May 18, 2011 Mechanical Engineering Department Umm Al-Qura University.
Introduction to Computer Engineering ECE/CS 252, Fall 2008 Prof. Mikko Lipasti Department of Electrical and Computer Engineering University of Wisconsin.
1. To strive for high ethical standards 2. To possess a serious commitment to professionalism and socially responsible behaviour.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
PROFESSIONAL CODE OF ETHICS: LECTURE TWO. Professional Ethics:  Concerns one's conduct of behavior and practice when carrying out professional work,
Professional Ethics and Responsibilities Part-II
6/12/ Legal and Ethical Issues in Computing Lecture one.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Ethics—Standard of Professional Behavior Required to Ensure the Public Health, Safety, and Welfare NCEES Past President W. Gene Corley, Ph.D., P.E., S.E.,
1 The Nature of Ethics Ethics is generally concerned with rules or guidelines for morals and/or socially approved conduct Ethical standards generally apply.
Chap (3)1 Chapter 3 Professional Codes of Ethics Almost every professional organization dealing with the field of computing has published its own code.

ECE362 Principles of Design
Engineering Design is an Iterative Process
Ethics, ECE 445, and You.
Professional Codes of Ethics
ENGINEERING ETHICS in 3D
ENGINEERING ETHICS in 3D
Professional and Ethical Responsibility for Engineers
Electrical Engineering
Seminar COE 390 Presentations Skills
I IEEE Code of Ethics Electrical and Computer Engineers
Professional and Ethical Responsibility for Engineers
Engineering Design is an Iterative Process
CS-480b Network Security Dick Steflik
Presentation transcript:

Ethics Presented by: Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas

What is Ethics? American Heritage Dictionary, 2 nd College ed., 1985 A principle of right or good conduct. A principle of right or good conduct. A system of moral principles or values A system of moral principles or values The study of the general nature of morals and of the specific moral choices to be made by the individual in his relationship with others. The study of the general nature of morals and of the specific moral choices to be made by the individual in his relationship with others. The rules or standards governing the conduct of the members of a profession. The rules or standards governing the conduct of the members of a profession.

University of Arkansas Fifteen Definitions of Academic Dishonesty Catalog of Studies “Academic dishonesty involves acts that may subvert or compromise the integrity of the educational process at the University of Arkansas. Included is an act by which a student gains or attempts to gain an academic advantage for himself or herself or another by misrepresenting his or her or another's work or by interfering with the completion, submission, or evaluation of work. These include, but are not limited to, accomplishing or attempting any of the following acts: 1. Altering of grades or official records. 2. Using any materials that are not authorized by the instructor for use during an examination. 3. Copying from another student's paper during an examination. 4. Collaborating during an examination with any other person by giving or receiving information without specific permission of the instructor. 5. Stealing, buying, or otherwise obtaining information about an examination not yet administered. 6. Collaborating on laboratory work, take-home examinations, homework, or other assigned work when instructed to work independently. 7. Substituting for another person or permitting any other person to substitute for oneself to take an examination.

University of Arkansas Fifteen Definitions of Academic Dishonesty, cont. 8. Submitting as one's own any theme, report, term paper, essay, computer program, other written work, speech, painting, drawing, sculpture, or other art work prepared totally or in part by another. 9. Submitting, without specific permission of the instructor, work that has been previously offered for credit in another course. 10. Plagiarizing, that is, the offering as one's own work the words, ideas, or arguments of another person without appropriate attribution by quotation, reference, or footnote. Plagiarism occurs both when the words of another (in print, electronic, or any other medium) are reproduced without acknowledgment or when the ideas or arguments of another are paraphrased in such a way as to lead the reader to believe that they originated with the writer. It is the responsibility of all University students to understand the methods of proper attribution and to apply those principles in all materials submitted. 11. Sabotaging of another student's work. 12. Falsifying or committing forgery on any University form or document. 13. Submitting altered or falsified data as experimental data from laboratory projects, survey research, or other field research. 14. Committing any willful act of dishonesty that interferes with the operation of the academic process. 15. Facilitating or aiding in any act of academic dishonesty.”

IEEE Code of Ethics Approved by the IEEE Board of Directors February 2006 Available: WE, THE MEMBERS OF THE IEEE, in recognition of the importance of our technologies in affecting the quality of life throughout the world and in accepting a personal obligation to our profession, its members and the communities we serve, do hereby commit ourselves to the highest ethical and professional conduct and agree: 1. to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment; 2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist; 3. to be honest and realistic in stating claims or estimates based on available data; 4. to reject bribery in all its forms; 5. to improve the understanding of technology, its appropriate application, and potential consequences; 6. to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations; 7. to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others; 8. to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin; 9. to avoid injuring others, their property, reputation, or employment by false or malicious action; 10. to assist colleagues and co-workers in their professional development and to support them in following this code of ethics.

(ISC)² Code of Ethics Cannons International Information Systems Security Certification Consortium (ISC)² (ISC)² issues the Certified Information Systems Security Professional (CISSP) Available: Protect society, the commonwealth, and the infrastructure. Protect society, the commonwealth, and the infrastructure. Act honorably, honestly, justly, responsibly, and legally. Act honorably, honestly, justly, responsibly, and legally. Provide diligent and competent service to principals. Provide diligent and competent service to principals. Advance and protect the profession. Advance and protect the profession.

Computer Ethics Institute Available: Ten Commandments Of Computer Ethics Computer Ethics Institute Available: 1. Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People’s Computer Work. 3. Thou Shalt Not Snoop Around In Other People’s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid. 7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. 8. Thou Shalt Not Appropriate Other People’s Intellectual Output. 9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.

Online Ethics Center for Engineering and Science Available: Case Western Reserve University has a good web site with case studies on ethics Case Western Reserve University has a good web site with case studies on ethics Available: Available:

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. University of Arkansas 311 Engineering Hall Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW: