You are on page 1of 78

© Noel E.

Estrella

Ethics in a
Computing Culture
Chapter 1 | Critical Reasoning and Moral Theory

Photos: Google Images


© Noel E. Estrella

Review using Kahoot


A Formative Assessment
● Download the Kahoot App via Playstore/IOS.
● The game pin is to be provided by your professor.
● You need to enter your name as a classic player

Photos: Google Images


Objectives:
1 What are ‘ethics’ and ‘morality’? How do
they differ?

2 Why do societies strive to create an


environment that is unanimously
considered ‘moral’?

3 What theories do they rely on to create


this ideal environment?

Institute of Information and Computing Sciences 3


Department of Information Technology Photos: Google Images
Borrowing a Password:
• Alice and Josh, two first-year undergraduate students, are good
friends. Josh tells Alice that his account on the university’s network
has been disabled and he needs to complete a paper for his English
class. He ask Alice to give him the password so that he can log
onto her account and write the paper. Because Alice considers
Josh to be a close friend, she provides him the password. Josh logs
onto Alice’s account and completes his paper for English. He did
not look at the content of any Alice’s files, nor did he delete or
modify anything. He simply wrote his paper and logged off the
system.

Institute of Information and Computing Sciences 4


Department of Information Technology Photos: Google Images
Case: Borrowing a Password
1. Did anyone in the scenario do anything wrong? Use your intuition to
define “WRONG” as you deem appropriate for the content of the case.
Explain your reasoning.

2. What were the risks involved?

3. Did anyone do anything “wrong”?

4. How do you interpret the word “wrong” in this case?

5. If a university policy stated that providing passwords to others is


prohibited, would the action be wrong?

Institute of Information and Computing Sciences 5


Department of Information Technology
Case: Borrowing a Password (continued)
• How would you react if Alice were a software engineer at
a software development firm?
• Why would this circumstance affect your decision?
• This case did not specify why Josh’s account was
disabled.
• How does this hinder your ability to decide the morality of this
case?

Institute of Information and Computing Sciences 6


Department of Information Technology
Case: Borrowing a Password (continued)
• Suppose Josh just accepted a job at a competitor of Alice’s
company.
• Would this information affect your previous decision?
• Suppose the terms of Alice’s employment required her to
protect the confidentiality of her company’s corporate
information, but she overlooked the fine details.
• Would her unawareness keep her action from being considered
immoral?

Institute of Information and Computing Sciences 7


Department of Information Technology
Case: Warning or Ticket?
• Consider the affected parties, as well as the risks,
involved with Dolores’ failure to stop at the stop sign.
• What should Officer Schmidt do in this situation?

Institute of Information and Computing Sciences 8


Department of Information Technology
Case: Warning or Ticket?
• No harm, no foul: principle that states it is wrong to
punish someone for a simple mistake when no actual
harm has been done

Institute of Information and Computing Sciences 9


Department of Information Technology
Moral Theories

• Why an answer is better than another


• Why its difficult to agree with the answer of other people

Institute of Information and Computing Sciences


Department of Information Technology Photos: Google Images
© Noel E. Estrella

Ethics and Morality


Chapter 1 | Critical Reasoning and Moral Theory
A. Morality and Ethics
ETHICS: a set of morally permissible standards for a
group that each member of the group wants every
other member to follow even if their doing so would
mean that he/she must do the same. (Davis)

MORALITY: the set of standards everyone wants


everyone else to follow even if their following them
means having to do the same. (Davis)

Standards of morality are similar to standards of


language: Rules regarding human behavior are
complex and have many exceptions.

Ethics = Rules
Morals = principle (right or wrong)

Institute of Information and Computing Sciences 12


Department of Information Technology Photos: Google Images
Ethics (“Ethos”)
• a system of moral principles
• The term is derived from the Greek word ethos which can mean custom,
habit, character or disposition.

Ethics covers the following dilemmas:


• how to live a good life
• our rights and responsibilities
• the language of right and wrong
• moral decisions - what is good and bad?

Loving | Caring | Respectful | Charity | Integrity | Honesty


Institute of Information and Computing Sciences 13
Department of Information Technology Photos: Google Images
Morality (“Mos”)
• Morality speaks of a system of behavior
in regards to standards of right or wrong
behavior.
• Morality carries the concepts of:
1. Moral standards, with regard to behavior;
2. Moral responsibility, referring to our
conscience; and
3. Moral identity, or one who is capable of
right or wrong action.

Institute of Information and Computing Sciences 14


Department of Information Technology Photos: Google Images
Morals
• Are the rules that govern which actions are right and which
are wrong. A morals can be for all of society or an
individual’s beliefs. Sometimes a moral can be gleaned
from a story or experience.
A. Do not gossip
B. Tell the truth
C. Do not vandalize property
D. Have courage
E. Keep your promises
F. Do not cheat

The Ten Commandments are the basis for many


of society’s morals.
Institute of Information and Computing Sciences 15
Department of Information Technology
Comparison
Ethics Morals
What are they? The rules of conduct Principles or habits with respect
recognized in respect to a to right or wrong conduct. While
particular class of human morals also prescribe dos and
actions or a particular group don'ts, morality is ultimately a
or culture. personal compass of right and
wrong.

Where do they Social system - External Individual - Internal


come from?

Why we do it? Because society says it is the Because we believe in


right thing to do. something being right or wrong.

Institute of Information and Computing Sciences 16


Department of Information Technology
Comparison
Ethics Morals
Origin Greek word "ethos" Latin word "mos" meaning
meaning"character" "custom"
Acceptability Ethics are governed by Morality transcends cultural
professional and legal norms
guidelines within a
particular time and place

Institute of Information and Computing Sciences 17


Department of Information Technology
Conflict between Ethics and Morality
A lawyer’s morals may tell her that murder is
reprehensible and that murderers should be
punished, but her ethics as a professional lawyer,
require her to defend her client to the best of her
abilities, even if she knows that the client is guilty.

A doctor may not euthanize a patient, even at the


patient's request, as per ethical standards for health
professionals. However, the same doctor
may personally believe in a patient's right to die, as
per the doctor's own morality.

Institute of Information and Computing Sciences


Department of Information Technology Photos: Google Images
18
B. Moral Theory (Normative Theories of Ethics)
• Moral Theory is a way of defining morality.
• Morality is not necessarily the same definition accepted by
everyone.
• The basic equation for defining morality:

• How do I know that Heart is good?


• Why is Heart good?

An action might be unethical, yet remain morally permissible.


(A doctor advertising her medical services’ fees)

Moral Theories are meant to help us figure out what


actions are right and wrong.

Institute of Information and Computing Sciences 19


Department of Information Technology
B.1 Religious Ethics
• Religious ethics: refers to a set of standards
for the followers of a particular religion.
• Doing the right thing’ usually is achieved by
obeying the dictates of one’s religion.

• All major religions offer their own set of ethics.

• Those standards would be morally permissible


according to the morality defined by that religion.

“Serves as a reminder that what hurts us hurts others, and that


what heals us, heals others.”

Institute of Information and Computing Sciences 20


Department of Information Technology Photos: Google Images
B.2. Divine Command Theory
• Divine Command Theory: a moral theory that
holds God, and only God, decrees what is right
and what is wrong.
• God’s will to be the foundation of ethics. According to
divine command theory, things are morally good or bad, or
morally obligatory, permissible, or prohibited, solely
because of God’s will or commands.
• Can a person who is not religious act morally?

Plato – “Is goodness loved by the gods because it is good, or it is good


because it is loved by the gods?”

Thomas Aquinas– “Things are good in and of themselves”

Institute of Information and Computing Sciences 21


Department of Information Technology
B.3. Cultural Relativism

• Cultural Relativism: is a moral theory that holds no valid, rational


criterion for determining if the right thing to do exists.
• members of one culture should not judge or be judged by a different
culture
• Nazis creating interment camps

“Cultural Relativism seems attractive and promote


tolerance.”
Institute of Information and Computing Sciences 22
Department of Information Technology Photos: Google Images
Cultural Relativism
• Tolerance is the willingness to let people do what they
wish, as long as there is no overriding justification.
• Argue that the people committing the acts were acting within the
framework of their culture and should not be judged by our standards,
but by the standards of their culture.

• Critics of cultural relativism argue that such acts are immoral in any
culture, and that some universal moral standards apply to all culture

• Two attributes of human culture that is universal


1. Morality – human cultures have some form of moral structure and
these structures seem to include the same basic concepts.
2. Language – if we cannot articulate the rules does not mean they do
not exist.

Institute of Information and Computing Sciences


Department of Information Technology 23
Why Do Jews Put Stones on
Graves?
• Ancient tradition of culture
• To Keep the Soul in This World (Talmud)
• Stones Last Longer Than Flowers
(permanence of memory)
• In Hebrew, “pebble” means “bond”

http://www.myjewishlearning.com/article/ask-the-expert-stones-on-graves/
Institute of Information and Computing Sciences 24
Department of Information Technology Photos: Google Images
B.4. Virtue Theory

• Virtue Theory: is a moral theory that, as the name implies, concerns the nature
of virtue and what it means to have virtue.
• It answers 2 questions:
1. What does it mean to be “good”?
2. How does one become good?
Video: Virtue Ethics. Retrieved from:
25
Institute of Information and Computing Sciences
Department of Information Technology
https://www.youtube.com/watch?v=cfSXUPrIC_4
Virtue Theory
1. What does it mean to be “good”?
• Aristotle said the “Ideal Man is one who possesses the characteristics
of a good person (virtues), including courage, friendliness, and modesty”
• Ideal Mean: means in between two extremes of human
characteristics
• It also represent s the half-way point between risk and generosity

2. What does it mean to be “good”? (Aristotle – 2 kinds of


virtues)
A. Intellectual Virtue – acquire through education, qualities of a
good thinker / learner (i.e. Curiosity, attentiveness)
B. Character Virtue – acquire by habitually acting according to
the virtues (i.e. Honest, respectful, kind)

Institute of Information and Computing Sciences 26


Department of Information Technology
Scenario 2
• Suppose that you are a SE who has been
directed by your boss to release a product
that you believe to be insufficiently tested.
• Suppose further that the software is used in
an automobile and could affect the safety of
the passengers.
• Clearly refusing to comply with your boss’
command could have consequences that
you fear.

Aristotle: “In fear and confidence, courage is


the mean”

Institute of Information and Computing Sciences 27


Department of Information Technology Photos: Google Images
Warning or Ticket?
• Herman Schmidt is a police officer. One morning he observed a driver, Dolores Delgado,
a young working mother, who failed to stop at a stop sign. They known each other for
years, and although they have never been close, they have always been friendly with
each other.
• When stopped, Dolores readily concedes that she missed the stop sign. She says that
she was on her way to drop her daughter at her day-care center before going to work. A
bee has flown through the window, upsetting her daughter, and Dolores had become
distracted. As a result, she simply did not notice the stop sign.
• She appeals to the officer to overlook her error and let her be on her way so that she can
get her daughter to day care and still get to work on time.
• Officer Schmidt has a decision to make. The law in this case permits a certain amount of
discretion by the police in the case of a “rolling stop”, but that discretion clearly does not
apply in this case. Dolores did not even see the stop sign, much less slow down for it

What should officer Schmidt do?


A.Give Dolores a warning?
B.Give Dolores a ticket?
C.Arrest Dolores
Institute of Information and Computing Sciences 28
Department of Information Technology
• Righteous Indignation: is the anger we feel at
someone’s undeserved good or bad fortune.
• strong feelings of anger when you think a situation is
not morally right or fair.
• Dolores deserves to get the ticket because she
broke the law, and her behavior endangered
others

• Virtue Ethics: is agent-centered as opposed to


action-centered. It focuses more on the character
of the person making the decision rather than on
the decision itself.

• A person becomes virtuous by repeatedly doing


virtuous acts until they become habitual.

Institute of Information and Computing Sciences 29


Department of Information Technology Photo: Google Images
B.5. Consequentialism & Utilitarianism

Consequentialism: theory of ethics Utilitarianism: is a consequentialist


that holds the consequence of an action, moral theory that says the right decision is
not the motivation behind the action, makes the one that causes the most happiness.
an action good or bad. “The greatest good for the greatest
amount of people”

Institute of Information and Computing Sciences 30


Department of Information Technology Photos: Google Images
Utilitarianism

Video: Utilitarianism. Retrieved from:


https://www.youtube.com/watch?v=TuZ7_ivZeHQ
Institute of Information and Computing Sciences 31
Department of Information Technology
B.5. Utilitarianism
• Origin: Jeremy Bentham (1748-1832) is
regarded as the “father of utilitarianism”,
with John Stuart Mill (1806-1873) his
strongest proponent.
• The principle of utilitarianism says that one
ought to do that which causes the greatest
utility.

• UTILITY in this case means maximizing happiness in the world.


• He mentioned that utilitarianism is motivated by the “greatest happiness
principle”
• Happiness is….pleasure and the absence of pain”
• Unhappiness means “pain and the absence of pleasure.”

Moral Act: Maximizes happiness

Institute of Information and Computing Sciences 32


Department of Information Technology Photo: Google Images
B.5. Utilitarianism

Pleasure is not simply the physical pleasure. It includes mental and emotional
pleasure in the sense of
• satisfaction of accomplishment
• Appreciation of an interesting idea
• Aesthetic
• Helping others

Moral Act: Maximizes happiness

Institute of Information and Computing Sciences 33


Department of Information Technology Photos Google Images
2 Forms of Utilitarianism
1. Act Utilitarianism: each ethical choice is evaluated according to
whether or not the action taken maximizes happiness.
• “It is the greatest good for the greatest number” (Bentham)
• UTILITARIAN CALCULUS – the process of calculating which action
will lead to the greatest happiness.

• Application of Act of Utilitarianism


• Schmidt : “If I let Dolores go, I will not have to write the ticket, and I will
not have to waste my time testifying in court. I certainly will be happier.
Dolores will certainly be much happier since she did not get a ticket.
So, overall, there is definitely an increase in happiness.

Person's act is morally right if and only if it produces at least as much happiness as
any other act that the person could perform at that time
Institute of Information and Computing Sciences 34
Department of Information Technology
2 Forms of Utilitarianism
2. Rule Utilitarianism: the concept of adopting a set of rules, and each act is
evaluated as to whether it conforms to them. The rules are selected so as to
maximize happiness if followed faithfully.
• The basic premise of rule utilitarianism is that easy-to-follow rules will lead to fewer
calculations
Bernard Gert rules of morality:
1.Do not kill.
2.Do not cause pain.
3.Do not disable.
4.Do not deprive of freedom.
5.Do not deceive.
6.Keep your promises.
7.Do not cheat.
8.Obey the law.
9.Do your duty.
Action is right as it conforms to a rule that leads to the greatest good, or that "the rightness or
wrongness of a particular action is a function of the correctness of the rule of which it is an
instance."
Institute of Information and Computing Sciences 35
Department of Information Technology
Act VS Rule Utilitariasm
• A RULE UTILITARIAN drives at night and sees a red intersection light.
Thinking "it would have good consequences if people would stick to
the rule and not cross red lights, so everyone is safe while waiting for a
short while", she would apply that rule to herself and wait for it to turn
green.

Meanwhile, the ACT UTILITARIAN might think


"well, I certainly hope that people, who aren't me,
in general follow that rule and stay put, but as
there's no one around who might get influenced by
my act, since there's no police around to fine me,
and since I would see an approaching car as it's
dark, I might as well cross right now."

Institute of Information and Computing Sciences 36


Department of Information Technology Photos: Google Images
B.6. Deontological Ethics
• Deontological ethics theories differ from consequentialist
theories
• Greek word “Deon” which means “DUTY”
• the intention behind the action is considered more important than
the end result
• focuses on rights, duties, obligations, and rules
• Assumes that the result will end badly if these rules are not met.
• Immanuel Kant deontological theories:
• “Nothing …[can] be called good without qualification except a
good will”
• A good will is the will of a person to act solely according to a
code of morality based purely in reason.

Institute of Information and Computing Sciences 37


Department of Information Technology
B.6. Deontological Ethics
• Kant’s Categorical Imperative
• Categorical imperative is a rule that must always be followed by all
rational beings.
• Categorical means absolute, unconditional, and an end in itself.
• Imperative means a command
Laws in Applied Ethics:
1. Universal law of nature – act only according to maxims that could be
adopted as universal laws.
2. Principle of the end in itself – treat humans, both yourself and others,
always as ends in themselves, and never merely as a means to an end.

“It is always morally acceptable to steal anything you want”


1.If it is okay to steal, then we should not expect to have any personal property.
2.If there is no such thing as personal property, then there is no such things as
“stealing”
Institute of Information and Computing Sciences 38
Department of Information Technology
B.7. Contractarianism
• Contractarianism is both political and moral theory.
• Some of its attributes can be merged with consequentialist
theories or with deontological theories.
• Stems from Thomas Hobbes (1588-1579)

• State of Nature: supports the idea that people are rational


beings who seek to promote the common interests of society in
order to promote their own self-interests, and the best way of
doing that is to promote the common interest of the society.

Institute of Information and Computing Sciences 39


Department of Information Technology
B.7. Contractarianism
Is a person’s self-interest really maximized by acting for the public
good?”

• Game Theory: a branch of mathematics in which an individual(a


player) makes choices that potentially create points for the player. The
number of points a player wins depends on his or her choices and on
the choices of other players.

• Prisoner’s Dilemma: a scenario in which two people are offered


a choice—cooperate or defect

Institute of Information and Computing Sciences


Department of Information Technology 40
B.8. Ethics of Justice
• Most ethicists are in search of ethical theories that
have these key qualities:

1. Impartiality: the quality that every person is


treated equally and no one is given preferential
treatment in the theory.

1. Universality – a decision reached by applying the


theory should be correct for everyone that has a
similar decision to make.

Institute of Information and Computing Sciences 41


Department of Information Technology Photos: Google Images
B.8. Ethics of Justice
• Rawls’s Theory of Justice: explores the basic rules that are
necessary to ensure fairness in society as a whole
• argues that the principles of “justice as fairness” underlie all just
societies (John Rawl)

• According to Rawl’s Theory of Justice, in order for a society to be


just:
1. Everyone has as much freedom as possible.
2. Everyone has an equal opportunity to reach desirable positions in society.
3. All socio-economic differences are of the most benefit to the least advantaged.

Difference Principle: social and economic inequalities are justified only if


such inequalities provide the greatest benefit to the least advantaged
Explains why impartiality is not always desirable.

Institute of Information and Computing Sciences 42


Department of Information Technology
B.9. Ethics of Caring
• Nel Noddings: morality boils down to a single virtue, which is
caring for other individuals

• Ethics of Caring: defines goodness in terms of whether or not


we take care of the people around us
• Noddings: the only inherent good is caring
• Kant: the only inherent good is good will
• Utilitarians: the only inherent good is happiness

Institute of Information and Computing Sciences 43


Department of Information Technology Photos: Google Images
B.9 Ethics of Caring
• Because it is possible to care for everyone, impartiality is rejected.
• It is only necessary to care for those with whom one shares a
relationship.
• There is no universal way to externally judge whether an action
is morally right or wrong.
• The judgment varies on the relationship between the one-
caring individual and the person being cared for.

Institute of Information and Computing Sciences 44


Department of Information Technology
B.9 Ethics of Caring

• A computerized pill dispenser is equipped with alarms and self-opening


caps that help remind patients to take their medication.
• Is it morally permissible to require all patients with a history of ignoring their
medication to use this technology?
• Is it morally permissible to require all elderly patients to use this technology?

Institute of Information and Computing Sciences 45


Department of Information Technology Photo: Google Images
C. Ethics of Reasoning
• Pure Reason: deductive reasoning on which Euclidean geometry is
based; its purpose is to establish the truth
• issues are straightforward

• Practical Reason: the reasoning used to make decisions


• issues are complex
• used to resolve ethical issues

Institute of Information and Computing Sciences 46


Department of Information Technology
C. Ethics of Reasoning
• Deliberative Critical Discussion: a conversation in which the
participants consider the partners in the discussion are well-
intended and informed; with this understanding, participants
bring their knowledge to the discussion to share their own
opinions and develop more refined perspectives.
Avoid:
- charged language
- hyperbole
- Ad hominem

Institute of Information and Computing Sciences 47


Department of Information Technology
C. Ethics of Reasoning
• Read the case “To Tell or Not To Tell.”
• Choose whether Arnold’s actions were ethical or
unethical, then elaborate on your reasoning.
• What are your arguments?
• Is there any situation you can allude to that will
help others to understand your perspective?

Institute of Information and Computing Sciences


Department of Information Technology
C. Ethics of Reasoning
• Read 1.5.5, “A Sample Deliberative Critical Discussion.”
• How did your opinion change after reading the dialogue?
• Do you still consider Arnold’s actions to be ethical?
• Did the context of the situation affect your view?
• Had the professor allowed it, would the ad hominem attack
against Alpha have helped to drive Delta’s argument?

Institute of Information and Computing Sciences 49


Department of Information Technology
Guilty or Not Guilty?
• A virtue theorist, a Kantian, and an act utilitarian are discussing a
court case.
• In this case, a person who was mentally ill refused his
medication and became violent, killing an innocent person.
• Describe the position that each of the theorists would be
most likely to hold regarding the mentally ill man’s moral
responsibility (see p. 40 ex. 14 for details).

Institute of Information and Computing Sciences 50


Department of Information Technology
© Noel E. Estrella

Prayer Before Study

Lord, true source of light and wisdom|


give me a keen sense of understanding,|
retentive memory | and the capacity to
grasp things correctly. | Grant me the
grace to be accurate in my expositions
|and the skill to express myself with
thoroughness and clarity. |Be with me at
the start of my work| guide its progress
and bring it to completion.| Grant this
through Christ our Lord, Amen. | St.
Vincent Ferrer, Pray for us. | St. Thomas,
intercede for us.

Citations:
Google Images
Youtube
© Noel E. Estrella

Ethics in a Computing
Culture
Chapter 2 |Computing Professions and
Professional Ethics

Photos: Google Images


© Noel E. Estrella

Week 3 Class Expectations


Demonstrate knowledge of the computing professionals and
professional ethics

1 Discuss the computing professions, their responsibilities and obligations


to their respective organizations and society.

Explain the roles they need to perform in an organization play to ensure


2
that professionals within the organization strive to behave morally.

Summative Activities
Chapter Activity (Killed by the Machine)
3
Solving Cases (Assignment/BB Discussion Board)

Formative Activity (Kahoot)


College of Information and Computing Sciences

Guide Questions:
What is a profession?

What responsibilities and


obligations do professionals have
to their respective organizations
and society?

What role does an organization


play to ensure that professionals
within the organization strive to
behave morally?

Photos: Google Images


5
College of Information and Computing Sciences

Technological Associations

PROFESSional

• Association for Computing Machinery: The


world’s first scientific and educational
computing society, founded in 1947

• Institute of Electrical and Electronics


Engineers: a non-profit professional association
dedicated to advancing technological innovation
and excellence
6
Photos: Google Images
College of Information and Computing Sciences

KILLED BY A MACHINE: THE THERAC-25


The Therac-25 was not a device anyone was happy to see. It was
a radiation therapy machine. In layman’s terms it was a “cancer
zapper”; a linear accelerator with a human as its target. Using X-
rays or a beam of electrons, radiation therapy machines kill
cancerous tissue, even deep inside the body. These room-sized
medical devices would always cause some collateral damage to
healthy tissue around the tumors. As with chemotherapy, the
hope is that the net effect heals the patient more than it harms
them. For six unfortunate patients in 1986 and 1987, the Therac-
25 did the unthinkable: it exposed them to massive overdoses of
radiation, killing four and leaving two others with lifelong injuries.
During the investigation, it was determined that the root cause of
the problem was twofold. Firstly, the software controlling the
machine contained bugs which proved to be fatal. Secondly, the
design of the machine relied on the controlling computer alone
for safety. There were no hardware interlocks or supervisory
circuits to ensure that software bugs couldn’t result in
catastrophic failures.
7
http://hackaday.com/2015/10/26/killed-by-a-machine-the-therac-25/
College of Information and Computing Sciences

What happened?

KILLED
KILLEDBY
BYAAMACHINE:
MACHINE:THE
THETHERAC-25
THERAC-25
8
Photos: Google Images
College of Information and Computing Sciences

Toyota Acknowledges Software Problem with


2010 Prius Brakes
• The U.S. National Highway Traffic Safety Administration has opened a
formal inquiry into the brakes of the 2010 Toyota Prius hybrid. It has
now received 124 complaints of faulty brakes, out of roughly 37,000 of
the cars sold to date in the U.S.
• Toyota said it would cooperate fully with the investigation, which
applies only to the 2010 model-year Toyota Prius hybrid.

http://www.greencarreports.com/news/1042269_update-braking-
issue-in-2010-toyota-prius-hybrid-recall-tbd
9
Photos: Google Images
College of Information and Computing Sciences

The Montero Sport SUA Issue Was All Driver Error


2015 was certainly a year that Mitsubishi Motors Philippines
Corporation (MMPC) would like to leave behind and forget,
what with all the negative press the company had to endure
when the sudden unintended acceleration (SUA) issue was at
its peak. Fortunately for the Japanese car brand, it can now
put the whole issue to rest when it posted the results of a
study conducted by a third party investigator on their website
this week.

“The investigation has found only one plausible root cause for
sudden unintended acceleration, and inability to stop the
Mitsubishi Montero Sport vehicle. Our hypothesis is that these
incidents were caused by the driver mistakenly applying the
accelerator, believing that they were pressing the brake
pedal.

“Other root cause hypotheses have been excluded because


they would require simultaneous, but temporary, malfunction
of both the engine control and the vehicle braking system
without fault conditions being logged by any vehicle systems
and DTCs (Diagnostic Trouble Code) being recorded. Since
these are independent systems, the possibility of
simultaneous failure is extremely low.

https://www.carmudi.com.ph/journal/its-official-the-montero-sport-sua-issue-was-all-
driver-error/
10
Photos: Google Images
College of Information and Computing Sciences

Based on the 2 cases, what are the principles and


responsibilities involve as IT professionals?
Why We Care about Professional Standards of Computing
• The privacy, safety, and well-being of the general public
often depends on computer software

Photos: Google Images


College of Information and Computing Sciences

Code of Ethics of the Filipino IT Professionals


1
I will promote public knowledge, understanding and appreciation of
Information technology.

I will consider the general welfare and public welfare and public
2
good in the performance of my work.
I will advertise goods or professional services in a clear and truthful
3
manner.
I will comply and strictly abide by the intellectual property laws,
4
patent laws and other related laws in respect of Information
Technology.

5 I will accept the full responsibility for the work undertaken and utilize
my skills with competence and professionalism.

2010, http://elainecervania.blogspot.com/2010/07/code-of-ethics-of-filipino-it.html
12
College of Information and Computing Sciences

Code of Ethics of the Filipino IT Professionals


6 I will make truthful statements on my areas of competence as well as
the capabilities and qualities of my product and services.

7 I will not disclose or use ant confidential information obtained in


course of professional duties without the consent of the parties
concerned except when required by the laws.
8
I will strive to attain the highest quality in both the products and
services that offer.
9
I will knowingly participate in the development of the Information
Technology.
10 I will uphold and improve the IT professionals’ standards through
continuing profession in order to enhance the IT profession.

2010, http://elainecervania.blogspot.com/2010/07/code-of-ethics-of-filipino-it.html
13
College of Information and Computing Sciences

Defining “Profession”
• No single definition of “profession” is accepted by everyone
• Does having a license turn you into a professional?

A profession is a vocation founded upon


specialized educational training, the purpose of which is
to supply disinterested objective counsel and service to
others, for a direct and definite compensation, wholly apart
from expectation of other business gain

MISSION of PRC: To deliberately, scientifically and consistently determine the competence


of professionals through the provision of professional standards and judicious issuance of
professional license.
P – rofessionalism and Integrity
R – esponsibility, Unity and Accountability
C – ompetence and Excellence
https://www.prc.gov.ph/vision-mission
14
https://en.wikipedia.org/wiki/Profession
College of Information and Computing Sciences

Defining “Profession”
• According to Michael Bayles, a professional:
1. requires extensive training
2. involves significant intellectual effort
3. provides an important service to society
4. often requires certification or licensing
5. often has an organization of members
6. often is autonomous in one’s work

15
Photos: Google Images
College of Information and Computing Sciences

Good Works Project


• Good Works Project: A research project
conducted at Harvard Graduate School
of Education to examine how young
people deal with ethical problems in
their professions
• defines a profession as any career in
which the worker is awarded a
degree of autonomy in return for
services to the public that are
performed at a high level

16
Photos: Harvard Graduate School of Education
College of Information and Computing Sciences

Profession
• The word “profession” means different things to different
people. But at its core, it’s meant to be an indicator of trust
and expertise.
• A disciplined group of individuals who adhere to ethical
standards.

• A professional is a member of a profession. Professionals


are governed by codes of ethics, and profess commitment
to competence, integrity and morality, altruism, and the
promotion of the public good within their expert domain.

• Professionalism comprises the personally held beliefs


about one’s own conduct as a professional. It’s often linked
to the upholding of the principles, laws, ethics and
conventions of a profession as a way of practice.
http://www.psc.gov.au/what-is-a-profession
17
Photos: Google Images
College of Information and Computing Sciences

Kultgen’s Attributes of Professions


• John Kultgen: professor at the University of Missouri, Columbia, who
presents twenty attributes compiled by sociologist Geoffrey Millerson
from twenty-one scholars of sociology as necessary for a vocation to
be considered a
profession
A profession:
1. involves a skill based on a theoretical foundation
2. requires extensive education
3. requires passing an exam
4. is organized and represented by one or more professional
organizations
5. adheres to a code of conduct
6. provides altruistic service
7. requires members to assume responsibility for the affairs of others

18
College of Information and Computing Sciences

Kultgen’s Attributes of a Profession


Core characteristics of a profession:
8. is indispensable for the public good
9. members are licensed so their work is sanctioned by the
community
10. Members are independent practitioners, serving individual clients
11. Members do their best to serve their clients impartially without
regard to any special relationship
12. Members are compensated by fees of fixed charges

19
College of Information and Computing Sciences

Kultgen’s Attributes of a Profession


Additional characteristics of a profession:
13. Members are highly loyal to their colleagues
14. Members regularly contribute to professional development
15. Members’ prestige is based on guaranteed service
16. Members use individual judgment in applying their profession
17. The work is not manual
18. Profits do not depend on capital
19. Professional status is widely recognized

20
College of Information and Computing Sciences

Professions and Codes


• What occupations, other than law and medicine, would you consider to
be professions? How well does each fit into Kultgen’s thirteen core
attributes?
• Does medicine have all of Kultgen’s thirteen core attributes?
• How about law? What attributes might be missing?

21
College of Information and Computing Sciences

A Moral Basis for Professions


• According to Michael Davis, a profession:
• is a number of individuals in the same occupation voluntarily
organized to earn a living by openly serving a certain moral
ideal in a morally permissible way beyond what law, market, and
morality would otherwise require.
• According to Davis, “a professional puts profession first”

22
College of Information and Computing Sciences

Case 1: Bribery
Lawyer| Physician | Reporter:
Suppose you are a practicing
professional, and you find out
that your client has been bribing
city officials to get inside
information on bids for city
projects.
Should you report your client to
the authorities or keep his
confidence?

23
Photos: Google Images
College of Information and Computing Sciences

Art. 210. BRIBERY


Title Seven Revised Penal Code. Crimes Committed by Public Officers

• Bribery connotes the idea of a public officer utilizing the power,


influence or prestige of his office for the benefit of an individual in
exchange for a consideration. The offense can not be considered
bribery if there is no consideration but the act may be considered as
a violation of the Anti Graft and Corrupt Practices Act .

1. Simple Bribery which is either : (a). Direct (b) Indirect


2. Qualified Bribery

24
College of Information and Computing Sciences

Art. 210. BRIBERY


Title Seven Revised Penal Code. Crimes Committed by Public Officers

1. Direct Bribery
A. That the accused is a public officer
B. That he received directly or through another, some gift or present, offer
or promise
C. That such gift, present offer or promise has been given in consideration of
his commission of some crime, or any act not consisting a crime, or to
refrain from doing something which it is his official duty to do
D. That the crime or act relates to the exercise of his functions as a public
officer

25
College of Information and Computing Sciences

Art. 210. BRIBERY


Title Seven Revised Penal Code. Crimes Committed by Public Officers

2. Indirect Bribery - The crime committed by a public officer who accepts a gift given by

reason of his office or position. A gift is actually received and not future promises or offers.
The officer must have done an act appropriating the gift for himself, his family or
employees. “ The essential ingredient … is that the public officer concerned must have
accepted the gift or material consideration ( Garcia vs. Sandiganbayan 507 SCRA 258)
1. An envelope was left on top of the desk of officer. The officer called his staff and told
them to use all the amount to buy food and snacks. This is indirect bribery
2. If the officer however gave it to the Jail or to some children, he is not liable
3. If he simply let the envelope drop on the floor and left it there, he is not liable.
4. If somebody pays the bill for his meal or drinks, he is not liable for indirect bribery as he
did not accept any gift.
5. Receipt of cash given as “share in winnings” or “balato” are included
26
College of Information and Computing Sciences

Case 2: Pornography on a University Computer


• Imagine you were Sheila, and you discovered pornographic
videos on the professor’s computer. What would you do?

27
Photos: Google Images
College of Information and Computing Sciences

Assignment (Solving Cases)


Case 4: Alice and Josh, two first-year undergraduate students, are good friends. Josh
tells Alice that his account on the university’s network has been disabled and he needs
to complete a paper for his English class. He ask Alice to give him the password so that
he can log onto her account and write the paper. Because Alice considers Josh to be a
close friend, she provides him the password. Josh logs onto Alice’s account and
completes his paper for English. He did not look at the content of any Alice’s files, nor
did he delete or modify anything. He simply wrote his paper and logged off the system.
Did anyone in the scenario do anything wrong? Use your intuition to define “WRONG” as
you deem appropriate for the content of the case. Explain your reasoning.

Case 5: Referring to your assignment 1 tiled 'Borrowing a Password" , did anyone do anything
“wrong”? If a university policy stated that providing passwords to others is prohibited, would
the action be wrong?

Case 1 Case 2 Case 3 Case 4 Case 5 Case 6 Case 7


29
College of Information and Computing Sciences

Assignment (Solving Cases)


Case 6-7: The Therac-25 was not a device anyone was happy to see. It was a radiation
therapy machine. In layman’s terms it was a “cancer zapper”; a linear accelerator with a
human as its target. Using X-rays or a beam of electrons, radiation therapy machines kill
cancerous tissue, even deep inside the body. These room-sized medical devices would
always cause some collateral damage to healthy tissue around the tumors. As with
chemotherapy, the hope is that the net effect heals the patient more than it harms them. For
six unfortunate patients in 1986 and 1987, the Therac-25 did the unthinkable: it exposed
them to massive overdoses of radiation, killing four and leaving two others with lifelong
injuries. During the investigation, it was determined that the root cause of the problem was
twofold. Firstly, the software controlling the machine contained bugs which proved to be
fatal. Secondly, the design of the machine relied on the controlling computer alone for safety.
There were no hardware interlocks or supervisory circuits to ensure that software bugs
couldn’t result in catastrophic failures.

Q1: Who should be responsible for the errors in a medical device?

Q1: What is/are the moral responsibility/ies of the software creators/developers


need to aware of ?
Case 1 Case 2 Case 3 Case 4 Case 5 Case 6 Case 7
30

You might also like