You are on page 1of 13

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

National Highway, Crossing Rubber, Tupi, South Cotabato

ETHICS FOR I.T. PROFESSIONALS


with Legal Aspects in Computing

___________________________________________________

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 1 of 13
LEARNING MANUAL
FOR
IT 223: ETHICS FOR I.T. PROFESSIONALS
_____________________________________________________

WEEK 3-4

COURSE OUTLINE

COURSE CODE : IT 223


TITLE : ETHICS FOR I.T. PROFESSIONALS
TARGET POPULATION : All College of Information Communication Technology Students
INSTRUCTOR : MR. FRANKLIN R. TAMAYO, MIT

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 2 of 13
COMPUTER ETHICS

INTENDED LEARNING OUTCOMES


At the end of this chapter, the student is expected to:

● State the Code of Ethics of Filipino IT Professionals.


● Apply the Principles formulated by the Association of Computing Machinery in dealing with other people, in
making judgement, in software designs and all other dealings in the exercise of the IT profession;
● Explain the Ten Commandments of Computer Ethics;
● Identify problems in a work scenario;
● Be a morally responsible student; and
● Manifest ethical thinking skills in analyzing and justifying computing issues.

Dicussion
Professional Code of Ethics:
It is a set of guidelines which are designed to set out acceptable behavior of member of a particular
group, association or profession.
A professional code of ethics states the principles and core values that are essential to the work of a
particular occupational group. Practitioners in many professions subscribe to a code of ethics that governs
their behavior. For example, doctors adhere to varying versions of the 2000-year-old Hippocratic Oath,
which medical schools offer as an affirmation to their graduating classes. Most codes of ethics created by
professional organizations have two main parts: (a) outlines what the organizations aspires to become, and
(b) typically lists rules and principles by which members of the organization are expected to abide. Many
codes also include a commitment to continuing education for those who practice the profession.
Laws do not provide a complete guide to ethical behavior. Just because an activity is not defined as
illegal does not mean it is ethical. You also cannot expect a professional code of ethics to provide an
answer to every ethical dilemma - no code can be definitive collection of behavioral standards. However,
following a professional code of ethics can produce many benefits for the individual, the profession and
society as a whole:
1. Ethical Decision Making: adherence to professional code of ethics means that practitioners use a
common set of core values and beliefs as a guideline for ethical decision making
2. High Standards of Practice and Ethical Behavior: adherence to a code of ethics reminds professionals of
the responsibilities and duties that they may be tempted to compromise to meet the pressures of
day-to-day business. The code also defines behaviors that are acceptable and unacceptable to guide
professionals in their interactions with others. Strong codes of ethics have procedures for censuring
professionals for serious violations, with penalties that can include the loss of the right to practice. Such
codes are the exception, however and few exist in the IT arena.
3. Trust and Respect from the General Public: public trust is built on the expectation that a professional will
behave ethically. People must often depend on the integrity and good judgments of a professional to tell
the truth, abstain from giving self- serving advice, and offer warnings about the potential negative side
effects of their actions. Thus, adherence to a code of ethics enhances trust and respect for professionals
and their profession.
4. Evaluation Benchmark: a code of ethics provides an evaluation benchmark that a professional can use as
a means of self-assessment. Peers of the professional can also use the code for recognition or censure.

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 3 of 13
Code of Ethics of the Filipino IT Professionals
1. I will promote public knowledge, understanding and appreciation of Information Technology.
2. I will consider the general welfare and public welfare and public good in the performance of my work.
3. I will advertise goods or professional services in a clear and truthful manner.
4. I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of
Information Technology.
5. I will accept the full responsibility for the work undertaken and utilize my skills with competence and
professionalism.
6. I will make truthful statements on my areas of competence as well as the capabilities and qualities of my product
and services.
7. I will not disclose or use any confidential information obtained in course of professional duties without the
consent of the parties concerned except when required by the laws.
8. I will strive to attain the highest quality in both the products and services that offer.
9. I will knowingly participate in the development of the Information Technology.
10. I will uphold and improve the IT professional's standard through continuing profession in order to enhance the IT
profession.

Code of Ethics of Association of Information Technology Professionals (AITP)


I acknowledge:

That I have an obligation to management, therefore, I shall promote the understanding of information processing
methods and procedures to management using every resource at my command.

That I have an obligation to my fellow members, therefore, I shall uphold the high ideals of AITP as outlined in the
Association Bylaws. Further, I shall cooperate with my fellow members and shall treat them with honesty and respect
at all times.

That I have an obligation to society and will participate to the best of my ability in the dissemination of knowledge
pertaining to the general development and understanding of information processing. Further, I shall not use
knowledge of a confidential nature to further my personal interest, nor shall I violate the privacy and confidentiality
of information entrusted to me or to which I may gain access.

That I have an obligation to my College or University, therefore, I shall uphold its ethical and moral principles.

That I have an obligation to my employer whose trust I hold, therefore, I shall endeavor to discharge this
obligation to the best of my ability to guard my employer's interests, and to advise him or her wisely and
honestly.
That I have an obligation to my country, therefore, in my personal, business, and social contacts, I shall uphold my
nation and shall honor the chosen way of life of my fellow citizens ze I accept these obligations as a personal
responsibility and as a member of this Association. I shall actively discharge these obligations and I dedicate myself
to that end

Principles
Principle 1: Public

Software engineers shall act consistently with the public interest. In particular, software engineers shall, as
appropriate:
1.01 Accept full responsibility for their own work.
1.02 Moderate the interests of the software engineer, the employer, the client and the users with the public good.
1.03 Approve software only if they have well-founded belief that is safe, meets specifications, passes appropriate
tests, and does not diminish quality of life, diminish privacy or harm the environment. The ultimate effect of be
worked should be for the public good.
1.04 Disclose to appropriate persons or authorities any actual or potential danger to the user, the public or the
environment, that they reasonably believe to be associated with software or related documents.
1.05 Cooperate in efforts to address matters of grave public concern caused by software, its installation,
maintenance, support or documentation.

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 4 of 13
1.06 Be fair and avoid deception in all statements, particularly public ones, concerning software or related
documents, methods and tolls.
1.07 Consider issues of physical disabilities, allocation of resources, economic disadvantage and other factors that
can diminish access to the benefits of software.
1.08 Been courage to volunteer professional skills to good causes and contribute to public education concerning the
discipline.

Principle 2: Client and Employer


Software engineers shall act in a manner that is in the best interests of their client and employer, consistent
with the public interest. In particular, software engineers shall, as appropriate:
2.01 Provide service in their areas of competence, being honest and forthright about any limitations of their
experience and education.
2.02 Not knowingly use software that is obtained or retained either illegally or unethically.
2.03 Use the property of the client or employer only in ways properly authorized, and with the clients or employer's
knowledge and consent.
2.04 Ensure that any document upon which they rely has been approved, when required, by someone authorized to
approve it.
2.05 Keep private any confidential information gained in their professional work, where such confidentiality is
consistent with the public interest and consistent with the law.
2.06 Identify, document, collect evidence and report to the client or the employer promptly it, in their opinion, a
project is likely to fail, to prove too expensive, to violate intellectual property law or otherwise to be problematic.
2.07 Identity, document and report significant issues of social concern, of which they are aware, in software or
related documents, to the employer client.
2.08 Accept no outside work detrimental to the work they perform for their primary employer.
2.09 Promote no interest adverse to the employer or client, unless a higher ethical concern is being compromised; in
that case, inform the employer or another appropriate authority of the ethical concern.

Principle 3: Product
Software engineers shall ensure that their products and related modifications meet the highest professional
standards possible. In particular, software engineers shall, as appropriate:
3.01 Strive for high quality, acceptable cost and a reasonable schedule, ensuring significant tradeoffs are clear to and
accepted by the employer and the client, and are available for consideration by the user and the public
3.02 Ensure proper and achievable goals and objectives for any project on which
they work or propose.
3.03 Identify, define and address ethical, economic, cultural legal and environmental issues related to work projects.
3.04 Ensure that they are qualified for any project on which they work or propose to work by an appropriate
combination of education and training, and experience.
3.05 Ensure an appropriate method is used for any project on which they work or propose to work.
3.06 Work to follow professional standards, when available, that are most appropriate for the task at hand, departing
from these only when ethically or technically justified.
3.07 Strive to fully understand the specifications for software on which they work.
3.08 Ensure that specifications for software on which they work have been well documented, satisfy the user's
requirements and have the appropriate approvals.
3,09 Ensure realistic quantitative estimates of cost, scheduling, personnel, quality and outcomes on any project on
which they work or propose to work and provide an uncertainty on any project on which they work or propose to
work and provide an uncertainty assessment of these estimates.
3.10 Ensure adequate testing, debugging, and review of software and related documents on which they work.
3.11 Ensure adequate documentation, including significant problems discovered and solutions adopted, for any
project on which they work.
3.12 Work to develop software and related documents that respect the privacy of those who will be affected by that
software.
3.13 Be careful to use only accurate data derived by ethical and lawful means and use it only in ways properly
authorized. Maintain the integrity of data, being sensitive to outdated or flawed occurrences.
3.14 Treat all forms of software maintenance with the same professionalism as new development

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 5 of 13
Principle 4: Judgment
Software engineers shall maintain integrity and independence in their professional judgment. In particular,
software engineers shall, as appropriate:
4.01 Temper all technical judgments by the need to support and maintain human values.
4.02 Only endorse documents either prepared under their supervision or within their areas of competence and with
which they are in agreement.
4.03 Maintain professional objectivity with respect to any software or related documents they are asked to evaluate.
4.04 Not engage in deceptive financial practices such as bribery, double billing, or other improper financial practices.
4.05 Disclose to all concerned parties those conflicts of interest that cannot reasonably be avoided or escaped.
4.06 Refuse to participate, as members or advisors in a private, governmental or professional body concerned with
software related issues, in which they, their employers or their clients have undisclosed potential conflicts of interest.

Principle 5: Management
Software engineering managers and leaders shall subscribe to and promote an ethical approach to
the management of software development and maintenance. In particular, those managing or leading
software engineers shall, as appropriate:
5.01 Ensure good management for any project on which they work, including effective procedures for promotion of
quality and reduction of risk.
5.02 Ensure that software engineers are informed of standards before being held to them.
5.03 Ensure that software engineers know the employer's policies and procedures for protecting passwords files and
information that is confidential to the employer or confidential to others.
5.04 Assign work only after taking into account appropriate contributions of education and experience tempered
with a desire to further that education and experience.
5.05 Ensure realistic quantitative estimates of cost, scheduling, personnel, quality and outcomes on any project on
which they work or propose to work and provide an uncertainty assessment of these estimates.
5.06 Attract potential software engineers only by a full and accurate description of the conditions of employment.
5.07 Offer fair and just remuneration
5.08 Not unjustly prevent someone from taking a position for which that person is suitably qualified.
5.09 Ensure that there is a fair agreement concerning ownership of any software, processes, research, writing or
other intellectual property to which a software engineer has contributed.
5.10 Provide for due process in hearing charges of violation of an employer's policy or of this Code.
5.11 Not ask a software engineer to do anything inconsistent with this Code.
5.12 Not punish anyone for expressing ethical concerns about a project.

Principle 6: Profession
Software engineers shall advance the integrity and reputation of the profession consistent with the public
interest. In particular, software engineers shall, as appropriate:
6.01 Help develop an organizational environment favorable to acting ethically.
6.02 Promote public knowledge of software engineering.
6.03 Extend software engineering knowledge by appropriate participation in professional organizations, meetings
and publications.
6.04 Support, as members of a profession, other software engineers striving to follow this Code.
6.05 Not promote their own interest at the expense of the profession, client or employer.
6.06 Obey all laws governing their work, unless in exceptional circumstances, such compliance is inconsistent with
the public interest.
6.07 Be accurate in stating the characteristics of software on which they work, avoiding not only false claims but also
claims that might reasonably be supposed to be speculative, vacuous, deceptive, misleading or doubtful.
6.08 Take responsibility for detecting, correcting and reporting errors in software and associated documents on
which they work.
6.09 Ensure that clients, employers and supervisors know of the software. engineer's commitment to this Code of
ethics and the subsequent ramifications of such commitment.

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 6 of 13
6.10 Avoid associations with businesses and organizations which are in conflict with this code.
6.11 Recognize that violations of this Code are inconsistent with being a professional software engineer. 6.12 Express
concerns to the people involved when significant violations of this Code are detected unless this is impossible,
counter-productive, or
6.13 Report significant violations of this Code to appropriate authorities when It is clear that consultation with
people involved in these significant violations is impossible counter-productive or dangerous.

Principle 7: Colleagues
Software engineers shall be fair to and supportive of their colleagues. In particular, software engineers shall,
as appropriate:
7.01 Encourage colleagues to adhere to this Code.
7.02 Assist colleagues in professional development.
7.03 Credit fully the work of others and refrain from taking undue credit.
7.04 Review the work of others in an objective, candid and properly documented way.
7.05 Give a fair hearing to the opinions, concerns or complaints of a colleague.
7.06 Assist colleagues in being fully aware of current standard work practices including policies and procedures for
protecting passwords, files and other confidential information and security measures in general.
7.07 Not unfairly intervene in the career of any colleague; however, concerns of the employer the client or public
interest may compel software engineers in good faith to question the competence of a colleague.
7.08 In situations outside of their own areas of competence call upon the opinions of other professionals who have
competence in that area.

Principle 8 : Self
Software engineers shall participate in lifelong learning regarding the practice of their profession and shall
promote an ethical approach to the practice of the profession. In particular, software engineers shall continually
endeavor to:

8.01 Further their knowledge of developments in the analysis, specification, design, development, maintenance and
testing of software and related documents, together with the management of the development process.
8.02 Improve their ability to create safe, reliable, and useful quality software at reasonable cost and within a
reasonable time.
8.03 Improve their ability to produce accurate, informative, and well-written documentation.
8.04 Improve their understanding of the software and related documents on which they work and of the
environment in which they will be used.
8.05 Improve their knowledge of relevant standards and the law governing the software and related documents on
which work.
8.06 Improve their knowledge of this Code, its interpretation and its application to their work.
8.07 Not give unfair treatment to anyone because of any irrelevant prejudices.
8.08 Not influence others to undertake any action that involves a breach of this Code.
8.09 Recognize that personal violations of this Code are inconsistent with being a professional software engineer.

Strengths Weaknesses
● Codes inspire the members of a profession to ● Directives included in many codes tend to be too
behave ethically. general and too vague.
● Codes guide the members of a profession in ethical ● Codes are not always helpful when two or more
choices. directives conflict.
● Codes educate the members of profession about ● A professional code's directives are never complete
their professional obligations. or exhaustive.
● Codes discipline members when they violate one or ● Codes are ineffective (have no "teeth") in
more of the code's directives. disciplinary matters.
● Codes "sensitize" members of a profession to ethical ● Directives in codes are sometimes inconsistent with
issues and alert them to ethical aspects they one another.
otherwise might overlook. ● Codes do not always distinguish between
● Codes inform the public about the nature and roles microethics issues and macroethics issues.
of the professions. ● Codes can be self-serving for the profession.
● Codes enhance the profession in the eye of the
public.

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 7 of 13
The Ten Commandments
The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is our
interpretation of them:
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.

The Hacking Community's Constitution:


1. We believe: That every individual should have the right to free speech in cyber space.
2. We believe: That every individual should be free of worry when pertaining to oppressive governments that control
cyber space.
3. We believe: That democracy should exist in cyber space to set a clear example as to how a functioning element of
society can prosper with equal rights and free speech to all.
4. We believe: That hacking is a tool that should and is used to test the integrity of networks that hold and safe guard
our valuable information.
5. We believe: Those sovereign countries in the world community that do not respect democracy should be
punished.
6. We believe: That art, music, politics, and crucial social elements of all world societies can be achieved on the
computer and in cyber space.
7. We believe: That hacking, cracking, and phreaking are instruments that can achieve three crucial goals: a. Direct
Democracy in cyber space. b. The belief that information should be free to all. c. The idea that one can test and know
the dangers and exploits of systems that store the individuals' information.
8. We believe: That cyber space should be a governing body in the world community, where people of all nations and
cultures can express their ideas and beliefs has to how our world politics should be played.
9. We believe: That there should be no governing social or political class or party in cyber space.
10. We believe: That the current status of the internet is a clear example as to how many races, cultures, and peoples
can communicate freely and without friction or conflict.
11. We believe: In free enterprise and friction free capitalism.
12. We believe: In the open source movement fully, as no government should adopt commercial or priced software
for it shows that a government may be biased to something that does not prompt the general welfare of the
technology market and slows or stops the innovation of other smaller company's products.
13. We believe: That technology can be wielded for the better placement of man kind and the environment we live
in.
14. We believe: That all sovereign countries in the world community should respect these principles and ideas
released in this constitution.

The above declared constitution is like a bill of rights which should be read in relation to the ten
commandments.

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 8 of 13
What is Computer Ethics?
It is a new branch of ethics that is growing and changing rapidly as computer technology also grows and
develops. The term "computer ethics" is open to interpretations both broad and narrow. On the one hand, for
example, computer ethics might be understood very narrowly as the efforts of professional philosophers to apply
traditional ethical theories like utilitarianism, Kantianism, or other moral theories to issues regarding the use of
computer technology. On the other hand, it is possible to construe computer ethics in a very broad way to include, as
well, standards of professional practice, codes of conduct, aspects of computer law, public policy, corporate
ethics--even certain topics in the sociology and psychology of computing.

In the industrialized nations of the world, the "information revolution" already has significantly altered many
aspects of life -- in banking and commerce, work and employment, medical care, national defense, transportation
and entertainment. Consequently, information technology has begun to affect (in both good and bad ways)
community life, family life, human relationships, education, freedom, democracy, and so on (to name a few
examples). Computer ethics in the broadest sense can be understood as that branch of applied ethics which studies
and analyzes such social and ethical impacts of information technology.

In recent years, this robust new field has led to new university courses, conferences, workshops, professional
organizations, curriculum materials, books, articles, journals, and research centers. And in the age of the
world-wide-web, computer ethics is quickly being transformed into "global information ethics".

Computer ethics deals with practical problems and focuses on the nature of moral action and responsibility:
How do I know whether or not an action is morally right or wrong?

Problem in Computer Ethics


A typical problem in Computer Ethics arises because there is a policy vacuum about how computer
technology should be used. Computers provide us with new capabilities and these in turn give us new choices for
action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central
task of Computer Ethics is to determine what we should do in such cases, that is, formulate policies to guide our
actions.... One difficulty is that along with a policy vacuum there is often a conceptual vacuum. Although a problem
in Computer Ethics may seem clear initially, a little reflection reveals a conceptual muddle. What is needed in such
cases is an analysis that provides a coherent conceptual framework within which to formulate a policy for action.
(Moor 1985, p. 266) Moor said that computer technology is genuinely revolutionary because it is "logically
malleable"

According to Moor, the computer revolution will occur in two stages. The first stage is that of "technological
introduction" in which computer technology is developed and refined. This already occurred during the first 40 years
after the Second World War. The second stage - one that the industrialized world has only recently entered - is that
of "technological permeation" in which technology gets integrated into everyday human activities and into social
institutions, changing the very meaning of fundamental concepts, such as "money," "education," "work," and "fair
elections." Moor's way of defining computer ethics is very powerful and suggestive. It is broad enough to be
compatible with a wide range of philosophical theories and methodologies, and it is rooted in a perceptive
understanding of how technological revolutions proceed.

Moor argues that computer ethics is unique because computers have certain properties that raise unique
issues and, according to Moor there are three properties that make computers a special case:

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 9 of 13
Figure 1.0: Moor makes the case that characteristics of computer-based technologies are such that they raise ethical issues that
are somewhat unique. Others have suggested that computeris no different from any other branch of professional ethics.

Logical Malleability:
Computers can be shaped and molded to perform any activity that can be characterized in terms of inputs ,
outputs and connecting logical operations. This is in contrast to the majority of manufactured products. For example,
a car, television or refrigerator has well-defined and quite specific functions. The logic of computers, however, can be
shaped in infinite ways through changes in hardware and software and in terms of their usage. This enables
computer-based technologies to exhibit tremendous flexibility.

Invisibility Factor:
An important fact about computers is that most of the time, and under most conditions, computer
operations are invisible. Moor identifies three kinds of invisibility that can have ethical significance:

1. Invisible abuse: Moor describes this as: "the intentional use of the invisible operations of a computer to engage in
unethical conduct". He cites an examples:
The programmer who realized he could steal excess interest from a bank. When interest on a bank account
calculated, there is often a fraction of a cent left over after rounding off. This programmer instructed a computer to
deposit these fractions of a cent to his own account.
The invasion of the property and privacy of others, computers can be programmed to surreptitiously remove
or alter confidential information.
2. Invisible programming values: these are values which, according to Moor, are embedded into a computer
program:
A programmer makes some value judgments about what is important and what is not. These values become
embedded in the final product and may be invisible to someone who runs the program.
3. Invisible complex calculation: in this context, Moor writes:
Computer today are capable of enormous calculations beyond human comprehension. Even if a program is
understood, it does not follow that the respective calculations are understood. Computers today
perform...calculations which are too complex for human inspection and understanding.

He argues that the issue is how much we should trust computer's invisible calculation. This becomes a
significant issue as the consequences grow in importance. For example:
Computers are used by the military in making decisions about launching nuclear weapons. On the one hand,
computers are fallible and there may not be time to confirm their assessment of the situation. On the other hand,
making decisions about launching nuclear weapons without using computers may be even more fallible and more
dangerous. What should be our policy about trusting invisible calculation?

Three "Levels" of Computex Ethics


Computer ethics questions can be raised and studied at various "levels." And each level is vital to the overall
goal of protecting and advancing human values. On the most basic level, computer ethics tries to sensitize people to
the fact that computer technology has social and ethical consequences.

This is the overall goal of what some call "pop" computer ethics. Newspapers, magazines and TV news
programs have engaged increasingly in computer ethics of this sort. Every week, there are news stories about
computer viruses, or software ownership law suits, or computer-aided bank robbery, or harmful computer

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 10 of 13
malfunctions, or computerized weapons, etc. As the social impact of information technology grows, such articles will
proliferate. That's good! The public at large should be sensitized to the fact that computer technology can threaten
human values as well as advance them.

The second "level" of computer ethics can be called "para" computer ethics. Someone who takes a special
interest in computer ethics cases, collects examples, clarifies them, looks for similarities and differences, reads
related works, attends relevant events, and so on, is learning "para" computer ethics. (I've borrowed this term from
Keith Miller, who is the first person I ever heard use it.) By analogy with a para medic - who is not a physician, but
who does have some technical medical knowledge -a "para" computer ethicist is not a professional ethicist, but does
have some relevant special knowledge. A para medic, of course, cannot do all that a physician does, but he or she
can make preliminary medical assessments, administer first aid and provide rudimentary medical assistance.
Similarly, a "para" computer ethicist does not attempt to apply the tools and procedures of a professional
philosopher or lawyer or social scientist. Rather, he or she makes preliminary assessments and identifications of
computer ethics cases, compares them with others, suggests possible analyses.

The third level of computer ethics I call "theoretical" computer ethics, because it applies scholarly theories
to computer ethics cases and concepts. Someone proficient in "theoretical" computer ethics would be able not only
to identify, clarify, compare

Moral Responsibilities of Computer Professionals


Some ethicists believe that all professionals, regardless of their practice, have special moral obligations as
professionals. For example, Michael Bayles (2003) argues that professionals have a special obligation to their clients
to be worthy of a client's trust, and this, Bayles further suggests, leads to obligations of honesty, candor,
competence, diligence, loyalty and discretion. In Bayles's scheme, all professionals who work in the computing field
would be bound to similar standards of obligations to their clients, regardless of their specific professional type.
Many computer professionals are software engineers or members of software engineering teams. Gotterbarn (2001)
believes that because software engineers and their teams are responsible for developing safety-critical systems, they
have significant opportunities to:
● Do good or cause harm
● Enable others to do good or cause harm
● Influence others to do good or cause harm
Thus, Gotterbarn suggests that the roles and responsibilities involved in the development of safety-critical
systems are a differentiating factor. Kevin Bowyer (2001) points out that the phrase "safety-critical system" is often
used to refer to computer systems that can have a "direct life-threatening impact". Examples of safety-critical
software applications typically include:
● aircraft and air traffic control systems
● mass transportation systems
● nuclear reactors
● missile systems medical treatment systems

Name Section:
Date: Score:

ASSESSMENT TASKS 1
You are working in an investigation firm, you and your team handle a case of a murdered business man. In
your investigation you got the recorded tape in the CCTV camera which showed the girl killing his boss, but the video
was blurd. You gave the video to the computer expert to scan using the special program the footage to make the
video clear and identify the suspect but the specialist said that it would take 48 hours to clearly view the image. On
that day your sister confessed and admitted that she was the one who killed the man. Will you report your sister to
the authority? Why?

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 11 of 13
Name Section:
Date: Score:

ASSESSMENT TASKS 2
You are the computer system administrator for a medium sized company. You can monitor the company
network from home and you frequently work from home. Your nephew, a college student is visiting for a week. He
asks to use your computer to check his e-mail. Sure, you say being a gracious host. What is the ethical problem?

IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 12 of 13
IT 223: Fundamentals of Database System

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC .

Page 13 of 13

You might also like