You are on page 1of 38
IT, Culture, and the Society At the end of this chapter, the students should be able to: 1. recall the current trends in the field of information technology; N . discuss the Internet of Things and its influence on the society; wo . explain automation and its impact on the society; 4, analyze how IT influences culture and social behavior; w . enumerate the rules of netiquette; a . describe cyberbullying and identify the steps to combat it; and 7. familiarize themselves with and demonstrate the imperatives of professional conduct for IT professionals. Living in the Information Technology Era OPENING ACTIVITY e—_—*. Field Observation With a partner, go around your school and find a scenario in which IT is implemented. Examples are a video projector used for classroom lectures; a biometric scanner used to record the attendance of school employees; or an interactive board used by students during class discussions. The more up-to-date the IT application, the better. Then, prepare a report guided by the following questions: 1. How was IT implemented in the given scenario? 2. If IT were removed in the observed setup, what possible (manual) processes would have taken place instead? 3. What advantages have you observed? How about disadvantages? KEY TERMS. oe __ Soe t 2 Q ACM - Association of Computing Machinery API - Application programming interface ATAS - Automated time and attendance system | DBG - Disruptive business group DTTB - Doctor-to-the-Barrio e-Payment - Electronic payment FHSIS — Field Health Service Information System IBM ~ International Business Machines Corporation JoT - Internet of Things LMS - Learning management system mHealth — Mobile health TT, Culture, and the Society pIN - Personal identification number RPA- Robotic process automation ‘TMS - Transport management solutions WAH — Wireless Access for Health Automation — refers to the use of equipment such as machines or computers to accomplish previously human-exclusive tasks. Cloud computing — is a tool in which users access big volumes of files and applications over the internet using multiple devices. Cloud foundry — delivers enterprise-level services that can easily integrate with cloud applications. Electronic commerce (e-commerce) — is a term for any type of business or commercial transaction, that involves the transfer of information across the internet. Electronic health (e-Health) — refers to the use of information and communications technologies in health care. Electronic learning (e-learning) - is utilizing electronic technologies to access educational curriculum and facilitate leaming outside of a traditional classroom. Freeware ~ refers to ad-supported programs, games, or utilities that are distributed as adware. Intared sensor ~ is a sensor that detects infrared light. It is usually Sed along with an infrared light source. faternet Of Things (oT) — refers to a network of physical objects emp ees consumer appliances, or industrial equipment with = edded technology that allows communication and interaction th each other, L ia, ne Sensor ~ is a sensor that can detect the level of liquids, ’ 8rainy or granular materials, such as powders, etc. Neti i rd eng Pin ~ acts as a second-level authentication method to ‘Ure that online transactions are secure. Living in the Information Technology Era Online banking — allows a user to execute financial transactions via the internet. Pressure sensor — is a sensor that helps determine the Weight or impact of a certain object. Proximity sensor — is a sensor that is able to detect objects within a certain range, even if that object is not physically touching the sensor yet. Ransomware ~ is a type of malware that can block access to the victim’s data. Robotic process automation (RPA) — is the application of technology that allows employees in a company to configure computer software or a “robot” to capture and interpret existing applications for processing a transaction, manipulating data, triggering responses, and communicating with other digital systems. . Sensors — are hardware devices that have the capability to measure an event, object, or any physical quality that is happening. Smart cities — are cities that adapt IoT in traffic management, roles waste disposal, even community monitoring, for the security of the city’s residents, Smoke sensor — is a sensor that is used to detect the presence of dangerous fumes such as carbon monoxide caused by fire. Spyware — is a software that aims to gather information about @% organization or a person without his or her knowledge, ‘Temperature sensor — is capable of méasuring temperature a8 W*! as detecting any rise or fall of it, Touch sensor ~ is a sensor that activates itself and becom’ capable of doing its fumction, %) is Ultrasonic sensor ~ is a sensor that detects sound waves such ® how radars and sonars pick-up sounds, TT, Culture, and the Society ne Impact of IT on the Society se as previously discussed, the seven major trends for 2017 are as follows: 1. JoT and smart home technology . Augmented reality and virtual reality |. Machine learning Automation . Big data . Physical-digital integrations A aur on Everything on demand Majority of organizations and companies nowadays have taken these trends into account, shifting manual business processes to automated ones and using ICT to improve their products and services. Among these seven trends, the internet of Things (IoT) and automation seem to have greatly influenced present-day a culture and society; thus, it is imperative to discuss these thrusts in detail. Internet of Things (IoT) Internet of Things (IoT) is a set-up of devices and objects which are connected together in a given network. Their connection, often wirelessly, is possible using both hardware and software. The hardware part is often made up of sensors that collect data, Which are then sent to other devices for analysis and possible ‘interpretation. Popular ‘examples are health wearable devices Such as step counters that are connected'to a mobile phone via luetooth. An app installed in the phone records the results in a was Weekly, or monthly basis for the mobile phone user to keep ck of his or her progress, t 157 a Figure 5.1 Everyday objects and activities connected to the internet Capabilities of IoT A major requirement for IoT is a strong internet connection, as all devices must be able to communicate with one another for the upload and download of needed data. But aside from connectivity, IoT should also be capable of the following (Mattern & Floerkemeier): 1. Integration across technology and business Sensors can be used to help improve business Processes, such as machines used for manufacturing and production, security systems, and even simple ones like automatically turning on. and off a light switch. Obviously, technology used for each application may vary; depending on the complexity and use. Software used t0 interpret incoming data and sending commands to the hardware must also be taken into account. Add to that the different protocols and standards used for connecting such as WiFi, Bluetooth, etc. An IoT platform must be TT, Culture, and the Society capable of integrating all of these so that the data may be used efficiently to improve productivity and even make predictions for optimum system performance. . Data analysis and synchronization v IoT should be capable of providing analytics to help organizations in their decision-making. However, for this to be effective, data must be synchronized to allow integration with all of the business aspects, including top management, operations, and even customer relations (Markkula, 2016). Security and service With all of these devices being used and all of these data being collected, a major concern is obviously security. To improve security, oT devices are usually divided into networks and each network has a different network access, some more restricted than others, without compromising connection and system integration. A typical example is your mobile phone notifying you if you will allow a new device to connect to it via Bluetooth. Normally, it will ask for a pairing connection via a simple ‘accept’ or using a more secure line such as a pin code. eo Applications of IoT __ _ With improyed business process' it is only natural for organizations to a Conducted by IOT Analytics, it was found t ToT projects are applied in cities (Scully, 2018). es and employee productivity, dopt IoT. In a study hat most of the 1,600 Topping the list aré as follows: 1. Smart cities ted IoT in traffic management, Smart cities have adop' an onitoring for the Waste disposal, and even community m' Security of the city’s residents. 159 5) oe Y. o ER Te CAN we Living in the Information Technology Era 2. Connected industries The oil and gas industry is identified as one of the front-runners for IoT connectivity which includes remote access to heavy equipment and machinery, from manufacturing to production. w . Connected buildings Connected building projects involve _ facility. automation to reduce energy costs. cS . Connected cars With smart cities adopting IoT for their traffic management, it is no longer surprising for the latest car models to be equipped with sensors and network 2 connectivity. Majority of projects relating to smart vehicles 2 revolve around vehicle diagnostics and monitoring. Hi 4 5. Smart energy Majority of smart energy projects focus on developing smart grids for renewable energy and infrastructure. Challenges of IoT But while things may look good using IoT, there are issues raised in adopting it fully. Texas Instruments, Inc. (2016) has identified six challenges in its implementation: 1. System requirements Industries normally identify different requirements, especially depending on the type of industry they belong to. Those in the food industry may require monitoring of perishable goods, from production and packaging 0 shipping. An automobile manufacturer may have the sam Process, but since products are different, requirements m2Y also change. Food will require data regarding temperatul® levels, whereas cars will tequire mechanical precision. 2. Connectivity With the varying connections—wired and wireless: * well as the different protocols governing each connectio™ cS a TT, Culture, and the Society it will be a challenge to come up with an IoT project concerning such protocols. Power requirements JoT devices need to run on batteries as majority of these devices are mobile. The challenge, therefore, is how to extend the battery life on such devices, especially those used in critical procedures, such as health, disaster management, and safety. Security One of the most highlighted issues in the application of IoT is data security. Confidential information such as patients’ records or employees’ profiles are considered at tisk. Security also includes system integrity, with malicious acts such as hacking and viruses proliferating online. Development The task of creating IoT projects may seem daunting, So one of the challenges identified is how to expand the capabilities of developers, and not just experts, in order to create more “smart things.” Services With data collected from IoT, it is important as well to determine where all this will go and to identify the Platform in which these IoT applications will be placed. Nowadays, cloud services offer end-to-end solutions to a number of IoT projects. Automation bet the available technology and standards for computer bg Mterconnection, the demand for system automation 0 a in i SSeS, Pera ated system means automated business proce Do tise, Colloquially called computerization,” having Service provider, monitoring, and even tools. Daan POE Nee i Z i MD % Fa? 162 9 Living in the Information Technology Era With the use of computer systems—hardware, software, oy both—the typical cumbersome and error-prone procedures have become automated. Examples include an automated payroll system, in which the employee payroll and payslips are automatically generated every payday; a manufacturing plant that packs powdered juices in foil containers/sachets where machines with sensors are used to fill up the packs up to the last milligram accurately; and even an automated weather forecast. With the introduction of cloud-computing, a growing number of organizations have gone into automation because of less cost and minimal server maintenance. Below are two of the common methods in implementing IT automation: > Robotic Process Automation (RPA) The Institute for Robotic Process Automation and Artificial Intelligence (IRPAAI) defined robotic process automation (RPA) as “the application of technology that allows employees in a company to configure computer software or a “robot” to capture and interpret existing applications for processing a transaction, manipulating data, triggering responses and communicating with other digital systems” (Institute for Robotic Process Automation & Artificial Intelligence, 2018, para. 3). While some may think of “robots” similar to those seen in movies, RPA actually focuses on computers being able to make logical decisions on the business process so that their human counterparts can focus on other tasks, thus increasing work productivity. This may not necessarily translate into hardware. Application systems and software may also be considered as RPA as they are applicable to the following: * Process Automation The use not only of industrial robots but also of “presentation-layer automation software” is capable of carrying out the daily operations of an organization. TT, Culture, and the Socie Process automation may include finance systems such as payroll, customer management systems such as online system registration, and academic institutions offering online enrollment systems, among others. A school that has a learning management system will be helpful for both the students and the teacher, especially in submitting requirements such as a homework research. The typical manual procedure for students submitting their homework will be, to come to class, wait for the teacher, and submit their papers personally. Automating the system requires the students to simply login to their school website, open their individual account for the current semester, search the subject they need access to, and upload their assignments at the comfort of their homes. IT Support Management Management of IT infrastructure and complex systems becomes easier using RPA. If part of the system fails, an automated system can immediately send notifications to the IT manager and technical support staff, informing them of the problem. Large buildings, for example, employ an automated emergency system, so if an emergency exit door has been opened, or a fire alarm goes off, the system will automatically detect the exact location of the opened door or activated alarm, as the location of the emergency will typically be assumed to be near that point. Automated Assistants Apple’s Siri is an example of a voice recognition software used in RPAs. Instead of machine language (binary), computers will be able to understand human language and interact with the same. Another example for automated assistants will be banks having an automated customer service hotline, Customers call ty Ve 163 Via arseyad (| we | GC Living in the Information Technology Era SN WS y the bank, and instead of a human Operator, an automated assistant will respond asking for details such as service choices, account numbers, ete Customers will use their phone’s touch keys to ente, choices and numbers while the computer interprets them as input data. After processing, a computer. generated report, such as account balances and other information will be provided. > Sensors Sensors are hardware devices that have the capability to measure an event, object, or any physical quality that is happening. Examples include the heart rate of a person while jogging, the temperature of a room, brightness of a light source, and the like. Sensors have the capacity to connect to other devices that can keep track of the data they are measuring. A mobile phone can be connected to a heart rate Sensor to record and monitor a person's health on a weekly or monthly basis. A web application can be accessed to monitor and control the CCTV operation of a house or building. These Sensors can be connected to a network, in various ways a5 explained earlier. However, there are several types of sensors, and with technology made available today, almost all of these hardware can now be automated. BEETS OR ENALD | 5 ; 5 4 3 __Sensors can be classified as analog or digital, but below is a list of sensors used in automation: Temperature sensor This sensor is capable of measuring temperatu? as well as detecting its rise or fall. This is helpful i® Systems that are temperature-sensitive such as POW" plants and server rooms, Infrared (IR) sensor 4 es This Sensor often used for security pope Selects infrared light, 1 is commonly used alon8 W an infrared light source. You might have see? i* TT, Culture, and the Society a vT movies in which a villain trying to access a restricted area would avoid crossing a series of IR sensors shown. as beams of red lines. Breaking or crossing the beam of red line would trigger an alarm. Ultrasonic sensor An ultrasonic sensor detects sound waves, such as how radars and sonars pick up sounds. A typical application is a light fixture turning on if the owner claps his or her hands, and turning off once he or she claps again. Touch sensor Through touch, the sensor activates itself and becomes capable of doing its function. The latest versions of Samsung and Apple smartphones now have a one-touch login to access the device, instead of a pin code or a pattern. Combining a touch sensor with biometrics, users can now access the content of their phones with just a single touch on the home button. Proximity sensor This sensor is able to detect objects within a certain range, even if the object is not physically touching the sensor yet. It is typically used in the light fixtures of houses and buildings. The light turns on if it detects a person is close by. This helps save on electricity as well as secure the premises. Pressure sensor A pressure sensor helps determine the weight or impact of a certain object. It is normally used by manufacturing companies, such as automobile companies, in designing their airbag system. They need to create an airbag that is strong enough to cushion a driver upon a head-on collision, but not too strong to injure him or her due to the recoil. 165 Oe oy a) wer 09 ving in the Information Technology Era wy + Level sensor This sensor can detect the level of liquids, fluids, grainy or granular materials, such as powders, ete Level sensors are used for disaster risk management systems, such as a flood monitoring system. Level sensors are used to determine if a flooded street will be passable by light vehicles or not. + Smoke/Gas sensor This sensor is used to detect the presence of dangerous fumes such as carbon monoxide caused by fire. Smoke alarms show how this sensor works. With these technologies made available, it is easy for big AES ‘ industries, small companies, and even private individuals to tee use them. Besides, the design and implementation of these 13 technologies have become cheaper, much simpler, and more 44) manageable. Thus, the concern now is not how to use this 24 technology but the correct way of using it. 5 ub bh The Influence of IT on Culture and Social Behavior With the prevalence of technology getting widespread, there are issues, both positive and negative, that surface. In Chapter 1, the positive and negative effects that ICT brings to individuals, organizations, and society are discussed. But regardless of whether the effect is positive or negative, the sudden surge of ICT has created an influence on how people’s lives have been changed, for better and for worse. However, it is important to note that any positive effect a person wants to see should not rely solely on the technology; it should also focus on self-realization and social interaction. Formerly called the “texting-capital of the world” due to the high number of SMS being sent and received on a daily basis, the Philippines is now dubbed as the “most social nation” i® TT, Culture, and the Society a 2015 study conducted by Opera Mini. The study identified that mobile phone users in the Philippines access social media more than any other sites. In Opera Mini’s top 50-user countries worldwide, the Philippines ranked first with an 86% page-view. With smartphones becoming cheaper and more accessible, people get to spend more time online, wherever and whenever they want to due to its mobility. The smartphone adoption rate has grown from 41% to 55% in a span of one year with Android as the most popular OS. The study also found that Filipinos view on average, 699 web pages per month. That is close to 23 pages viewed per day. However, with this type of technological progress, it is observed that the attitude and behavior of people, not just Filipinos, are evolving to meet technology’s evolution. For example, the invention of the telephone in 1800s paved the way for long-distance communication. It created a behavior for people to stay at home and call someone instead of going to the other person's house and have a face-to-face conversation. Fast- forward to 2017, people call each other on their mobile phones just to ask what they want to eat for lunch. With the invention of cars and other modes of transportation, humans have created a culture of how they do commuting, the concept of carpooling, and even the options of where to spend vacations. It is the same with the introduction of technology and the internet. The fast- paced evolution of mobile technology and the internet has greatly changed how people perceived communication. In previous chapters, it is mentioned how online commerce started on the web, but later on evolved into a mobile platform, revolutionizing the way customers buy products and services. Gilkey (2015) identified in his article the many hundreds of small ways that technology alters individual and collective behavior on a daily basis, Jt may not be noticed, but these “small ways” are slowly becoming prominent which is probably why the so-called “generation wars” are now becoming popular (ie., Baby Boomers ys. Gen X vs. Millennials) with the obvious disparity between these generations publicized in social media, 167 ) A _ EN a of” (, Living in the Information Technology Era Zp Influence on Culture Online Reviews With the proliferation of online information, it is easy to details on a certain movie or a book. However, with sites suc] Rotten Tomatoes, one can actually make a decision on What m to watch simply by reading the “reviews” of other People. If the review is “good,” then the person might watch the movie, But if the review is “bad,” then he or she might consider other Movies, This trend of having other people do the task first for others— watching the full movie and informing people online if the film is worth watching or not—is an example of how technology affects the basic human behavior of decision-making. fing has Ovie Weblogging/Social Media Nowadays, food bloggers post pictures of their meals in restaurants along with a food review. This trend created a culture of people dining with friends or family without actually interacting with them. People would first take Pictures of their meal and post it online. Others, during the course of the meal, would even use their phones to update their online status instead of talking to the other people in their group. ‘This is one typical example of technology, in the form of weblogging and social media, affecting social interaction, YouTube Learners YouTube is one of the most popular social media sites People can watch videos, comment on them, and upload thet own videos, among others, Thus, YouTube serves as a source ° nideos with people searching for almost about anything oaline— from trivial topics to More serious subject matter. This fac | influences the acquisition of knowledge and learning of om | Stil sets Instead of reading books or listening to thei t=ch®"® class lecture, students would rather watch YouTube to lea a lesson. Again, this is another situation in which technology #* the culture, this time, of learning, eeyee Ye | DAY TT, Culture, and the Society aN Influence on Social Behavior Cyberbullying Behavioral choices especially of teenagers or adolescents are influenced by technologies. Cyberbullying, for example, is a serious phenomenon brought about by social media. Cyberbullying is an unwanted, hostile behavior done by individuals to other people in the hope of gaining control over them. Cyberbullies can be classmates, neighbors, or officemates. Victims of bullying often end up with personal traumas. And since the act of bullying is done online, the attackers may also be individuals you do not know as they hide behind their internet profiles. An internet profile, also called an internet identity, online identity, or internet persona, is a profile created by internet users to establish their social identity in online communities, social media sites, and other websites. Because some consider an online identity to be a possible breach in privacy, this has led to the creation of an online “mask,” an online profile created through a series of questions (username, gender, age, etc.). However, this “mask” may lead to a misdirection, or in a worse case, to misinformation. For example, while a handle or username “student2006” may mean that the user is a student, “2006” may mean either the user’s year of birth or year of entering school. Unfortunately, some. internet profiles are created to intentionally mislead or misinform people. In the previous example, it is possible that the username is randomly created and it is not at all related to the user’s real identity. Choosing a gender also gives the user the option to either be a boy or a girl. Setting the birthdate online gives the person the option to either be younger or older especially since Facebook requires its users to be at least 13 years of age before they can create an account. Registering someone who is 13 years and below on their behalf is also not allowed and is considered to be a violation of their terms and conditions (Facebook, 2018). However, again, one can Living in the Information Technology Era indicate any age and continue using Facebook when he or she is below the minimum age requirement. This misdirection or misinformation may have dangerous consequences, which is why it is important to follow the netiquette rule on personalizing IT. | | . | The internet profile, be it true or misleading, apparently gives people the confidence they would not normally have if they are in a face-to-face confrontation. A seemingly innocent picture, for instance, or a grammatically wrong post may be criticized or bashed. Cyberbullying comes in the form of messages or images, such as memes. Since messages or images can be posted anonymously, it is hard and oftentimes, difficult to trace the source. It becomes a more problematic if the message or image gets re-posted and ke! distributed quickly online, or goes “viral.” Finding the original is t post might prove to be even harder. at Victims of cyberbullying may experience the same trauma Os as a real-life bullying victim. The difference, however, is that yb cyberbullying is ona much larger scale. Defending oneself from if this kind of attack is difficult as’ most of the cyberbullies use oh internet personas which, as previously discussed, may be real or not. Even their actual location may be difficult to trace. The good news is that the society—communities and the government—are devising ways to stop bullying — be it digital or otherwise. As discussed in the previdus chapter, the Philippines has identified several laws, including the Cyber Crime Prevention Act, also known as R.A. 10175, to help catch cyberbullies. But, ultimately, in order to prevent cyberbullying from happening, individuals especially the youth are encouraged to talk to their families and friends in case they experiencing such a situation online. Involving parents and teachers in young individuals’ ‘social media activities such as adding them to Facebook may help, if not, stop cyberbullying as they can also see any untoward incidents happening to these youngsters while online (Prevent Cyberbullying, 2017), TT, Culture, and the Society Netiquette Netiquette is a combination of the words internet and etiquette. It describes how one should act online. Netiquette brings in policies for all the features and qualities of the internet, including the use of the World Wide Web (WWW), email services, File Transfer Protocol (FTP), chat rooms, and instant messaging. There are different types of netiquette implemented all over the world. > Netiquette for Social Media The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and others is neither a bad habit nor a good habit in one’s personal life. Using social media is good for easy communication with friends and even long-lost friends and relatives. But there are some netizens who use their social media accounts to discredit other people by posting or shouting ruthless words about a particular person or sharing a status that maligns one’s character or reputation. Some of the rules of netiquette for social media are as follows (Spira, 2010): a. The Personalize IT Rule, Make sure to put restrictions in accepting friends or followers on your social media (e.g., Facebook, Twitter, Instagram, LinkedIn). It js not about having the most number of followers or friends. What matters is who you interact with and how you interact with them. . The Off-limits Rule. Know your limitations when inions on different subjects or our school, religion, personal and even some controversial yur limitations can s voicing out your op! topics concerning y information, workplace, subjects such as politics. Knowing you save you from dire consequences later on. The Tag - You're It Rule, Be careful in tagging in your status post or photos. You may someone either ing you in their posts also restrict someone from taggi 174 v mY : aN wre Sd © Uving in the Information Technology Era and photos. Always think of your safety, as well ag others’ personal boundaries. > Netiquette for Email Services, Chat Rooms, and Instant Messaging Email services such as sending and receiving an email from someone (professional to personal) anywhere in the world are used in numerous contexts. Shown in the figure are some guidelines in composing an email. eeUesa = nesc=) ry Recipient (to whom the email will be sent) Alexie Erese Ballon (ust-ics.mygbiz.com) ¢—| REQUEST ENDORSEMENT €—| Subject Line (gives hint of the purpose of the email) Dear Mr. Ballon, €—} Salutation (serves as greetings to the recipient) Good evening Ma'am. | hope this email finds you well. My sincerest apologies for sending you an email this ate. My team and | participated in the CHED Extended CPE Grant with a research title “UST-ICS Student Academic Performance Evaluation through Data Mining and Analytics as Suggestive Input to Curriculum | Body of Improvement”. One of the requirements to qualify for the final vetting forthe _||| the email last quarter of 2017 is an endorsement from OVRRI. | was instructed by Dr. Peralta | (must be to seek endorsement from your office by providing the title of our research short and Proposal specific) On behalf of my team, | would lke to sincerely thank you for the support that you ‘could extend fo us in this undertaking, porn Sender Informati Information Technology, USTAICS wit Attachment (If the user wishes to include Delete/Trash Bin files such as documents, images, etc.) Figure 5.2 Guidelines in composing an email TT, Culture, and the Society AN » Netiquette for Chat Rooms and Instant Messaging Joining chat rooms and sending instant messages, although mandatory in social media, have become a trend for users. This is especially beneficial for people working in different places such as a person working overseas while his or her friend or relative is in the Philippines. Instead of spending for telcom services, the person just needs internet connection. Still, there are guidelines for using instant messaging applications. For instance, someone might interrupt and request you to accept him or her or to be connected to your account without your knowing who that person really is. a. Think long and hard before accepting a private conversation, especially with someone not on your friends list. Not everyone online may be as they seem to be. b. In a group chat, include only those that are in your . friends list. 4 iS If possible, do not give your personal information while chatting, including your photos or “selfies.” 4d. When in doubt, save a copy or make a back-up of your conversation (chat). e. You must log out from your account at all times, especially if you are in a public place, such as a computer shop. You may opt to customize your account settings from public to private account. mn Professional Ethics While netiquette applies to all netizens, IT professionals Specifically follow an ethical practice as they are the front liners, Support, and backend of ICT. E aS ts i S > LP Gp ving in the Information Technology Era The Association of Computing Machinery (ACM) has identified 24 imperatives of professional conduct for IT professionals. It contains many, but not all, issues IT professionals are likely to face while using, creating, and implementing ICT. Section 1 outlines the fundamental ethical considerations while Section 2 provides additional, more specific considerations of professional conduct. Section 3 is intended specifically for individuals who have a leadership role, whether in the workplace or in a volunteer capacity such as in organizations like ACM. Principles involving compliance with this Code are laid out in Section 4. 1, GENERAL MORAL IMPERATIVES As an ACM member, I will.... 1.1 Contribute to society and human well-being. This principle concerning the quality of life of all people affirms an obligation to protect fundamental human rights and to respect the diversity of all cultures. An essential aim of computing professionals is to minimize negative consequences of computing systems, including threats to health and safety. When designing or implementing systems, computing professionals must attempt to ensure that the products of their efforts will be used in socially responsible ways, will meet social needs, and will avoid harmful effects on health and welfare. In addition to a safe social environment, human well-being includes a safe natural environment. Therefore, computing professionals who design and develop systems must be alert to, and make others aware of, any potential damage to the local or global enyironment, 1.2 Avoid harm to others, “Harm” means injury or negative consequences, such as undesirable loss of information, loss of property, TT, Culture, and the Society property damage, or unwanted environmental impacts. This principle prohibits use of computing technology in ways that result in harm to any of the following: users, the general public, employees, and employers. Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources such as the time and effort required to purge systems of “computer viruses.” Well-intended actions, including those that accomplish assigned duties, may lead to harm unexpectedly, In such an event, the responsible person or persons are obligated to undo or mitigate the negative consequences as much as possible. One way to avoid unintentional harm is to carefully consider potential impacts on all those affected by decisions made during design and implementation. To minimize the possibility of indirectly harming others, computing professionals must minimize malfunctions by following generally accepted standards for system design and testing. Furthermore, it is often necessary to assess the social consequences of systems to project the likelihood of any serious harm to others. If system features are misrepresented to users, co-workers, or supervisors, the individual computing professional is responsible for any resulting injury. In the work environment, the computing professional has the additional obligation to report any signs of system dangers that might result in serious personal or social damage. If one’s superiors do not act to curtail or mitigate such dangers, it may be necessary to “blow the whistle” to help correct the problem or reduce the risk. However, capricious or misguided reporting of violations can, ~X ving in the Information Technology Era itself, be harmful. Before reporting violations, al] relevant aspects of the incident must be thoroughly assessed. In particular, the assessment of risk and responsibility must be credible. It is suggested that advice be sought from other computing professionals, See principle 2.5 regarding thorough evaluations. 1.3 Be honest and trustworthy. Honesty is an essential component of trust, Without trust an organization cannot function effectively. The honest computing professional will not make deliberately false or deceptive claims about a system or system design, but will instead provide full disclosure of all pertinent system limitations and problems. ‘A computer professional has a duty to be honest $ 49 : rae "4 about his or her own qualifications, and about any 38 circumstances that might lead to conflicts of interest. a Membership in volunteer organizations such as 4 ACM may at times place individuals in situations bh where their statements or actions could be interpreted as carrying the “weight” of a larger group of professionals. An ACM member will exercise care to not misrepresent ACM or positions and policies of ACM or any ACM units. 1.4 Be fair and take action not to discriminate. The values of equality, tolerance, respect for others, and the principles of equal justice govern this imperative. Discrimination on the basis of race, S€X, religion, age, disability, national origin, or other such factors is an explicit violation of ACM policy and will not be tolerated. Inequities between different groups of people may result from the use or misuse of information and technology. In a fair society, all individuals would IT, Culture, and the Soclety have equal opportunity to pa from, the use of computer resources regardless sex, religion, age, disability, national origin, or other such similar factors. However, these ideals do not justify unauthorized use of computer resources nor do they provide an adequate basis for violation of any other ethical imperatives of this code. rlicipate in, or benefit of race, 1.5 Honor property rights including copyrights and patent. Violation of copyrights, patents, trade secrets, and the terms of license agreements is prohibited by law in most circumstances. Even when software is not so protected, such violations are contrary to professional behavior. Copies of software should be made only with proper authorization. Unauthorized duplication of materials must not be condoned. 1.6 Give proper credit for intellectual property. Computing professionals are obligated to protect the integrity of intellectual property. Specifically, one must not take credit for other’s ideas or work, even in cases where the work has not been explicitly protected by copyright, patent, etc. 1.7: Respect the privacy of others. Computing and communication technology enables the collection and exchange of personal information on a scale unprecedented in the history of civilization. Thus, there is increased potential for violating the privacy of individuals and groups. It is the responsibility of professionals to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access OF accidental disclosure to inappropriate individuals. Furthermore, procedures must be established to allow individuals to review their records and correct inaccuracies. DN) XR \ Wwe. a ¢ Living in the Information Technology Era e This imperative implies that only the necessary amount of personal information be collected in a system, that retention and disposal periods for that information be clearly defined and enforced, and that personal information gathered for a specific purpose not be used for other purposes without consent of the individual(s). These principles apply to electronic communications, including electronic mail, and prohibit procedures that capture or monitor electronic user data, including messages, without the permission of users or bona fide authorization related to system operation and maintenance. User data observed during the normal duties of system operation We and maintenance must be treated with strictest e confidentiality, except in cases where it is evidence i for the violation of law, organizational regulations, a or this Code. In these cases, the nature or contents ui of that information must be disclosed only to proper ty authorities. 4 1.8 Honor confidentiality. yh The principle of honesty extends to issues of confidentiality of information whenever one has made an explicit promise to honor confidentiality or, implicitly, when private information not directly related to the performance of one’s duties becomes available. The ethical concern is to. respect all obligations of confidentiality to employers, clients, and users unless discharged from such obligations ba seauirements of the law or other Principles of this 2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES As an ACM computing Professional, I wil] » and digas re me Bates quality, effectiveness oth professional work, © Process and products of IT, Culture, and the Society Excellence is perhaps the most important obligation of a professional. The computing professional must strive to achieve quality and to be cognizant of the serious negative consequences that may result from poor quality in a system. 2.2 Acquire and maintain professional competence. Excellence depends on individuals who take responsibility for acquiring and maintaining professional competence. A professional must participate in setting standards for appropriate levels of competence, and strive to achieve those standards. Upgrading technical knowledge and competence can be achieved in several ways: doing independent study; attending seminars, conferences, or courses; and being involved in professional organizations. 2.3 Know and respect existing laws pertaining to professional work. ACM members must obey existing local, state, provincial, national, and international laws unless there is a compelling ethical basis not to do so. Policies and procedures of the organizations in which one participates must also be obeyed. But compliance must be balanced with the recognition that sometimes existing laws and rules may be immoral or inappropriate and, therefore, must be challenged. Violation of a law or regulation may be ethical when that law or rule has inadequate moral basis or when it conflicts with another law judged to be more important. If one decides to violate a law or rule because it is viewed as unethical, or for any other reason, one must fully accept responsibility for one’s actions and for the consequences. 2.4. Accept and provide appropriate professional review. Quality professional work, especially in the computing profession, depends on professional reviewing and critiquing. Whenever appropriate, o ae 2? Jao ORY N Af sf 0 Cou 2% é Living in the Information Technology Era individual members should seek and utilize peer review as well as provide critical review of the work of others. 2.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks. Computer: professionals must strive to be perceptive, thorough, and objective when evaluating, recommending, and presenting system descriptions and alternatives. Computer professionals are in a position of special trust, and therefore have a special responsibility to provide objective, credible evaluations to employers, clients, users, and the public. When 124 6 i providing evaluations, the professional must also Ase identify any relevant conflicts of interest, as stated in aa imperative 1.3. ol As noted in the discussion of principle 1.2 on a avoiding harm, any signs of danger from systems 4 must be reported to those who have opportunity and/ bk or responsibility to resolve them. See the guidelines for imperative 1.2 for more details concerning harm, including the reporting of professional violations. 2.6 Honor contracts, agreements, and assigned responsibilities. Honoring one’s commitments is a matter of integrity and honesty. For the computer professional, this includes ensuring that system elements perform as intended. Also, when one contracts for work with another party, one has an obligation to keep that patty properly informed about progress toward completing that work. A computing professional has a responsibility ' request a change in any assignment that he or she feels cannot be completed as defined, Only after serious consideration and with full disclosure of risks and 2.7 TT, Culture, and the Society concerns to the employer or client, should one accept the assignment. The major underlying principle here is the obligation to accept personal accountability for professional work. On some occasions, other ethical principles may take greater priority. A judgment that a specific assignment should not be performed may not be accepted. Having clearly identified one’s concerns and reasons for that judgment, but failing to procure a change in that assignment, one may yet be obligated, by contract or by law, to proceed as directed. The computing professional’s ethical judgment should be the final guide in deciding whether or not to proceed. Regardless of the decision, one must accept the responsibility for the consequences. However, performing assignments “against one’s own judgment” does not relieve the professional of responsibility for any negative consequences. Improve public understanding of computing and its consequences. Computing professionals have a responsibility to share technical knowledge with the public by encouraging understanding of computing, including the impacts of computer systems and their limitations. This imperative implies an obligation to counter any false views related to computing. 2.8 Access computing and communication resources only when authorized to do so. Theft or destruction of tangible and electronic property is prohibited by imperative 1.2-“Avoid harm to others.” Trespassing and unauthorized use of a computer or communication system is addressed by this imperative. Trespassing includes accessing communication networks and computer systems, 2 Ni DAY \a ving in the Information Technology Era w or accounts and/or files associated with those systems, without explicit authorization to do so, Individuals and organizations have the right to restrict access to their systems so long as they do not violate the discrimination principle (see 1.4). No one should enter or use another’s computer system, software, or data files without permission. One must always have appropriate approval before using system resources, including communication ports, file space, other system peripherals, and computer time. . ORGANIZATIONAL LEADERSHIP IMPERATIVES As an ACM member and an organizational leader, Iwill... BACKGROUND NOTE: This section draws extensively from the draft IFIP Code of Ethics, especially its sections on organizational ethics and international concerns. The ethical obligations of organizations tend to be neglected in most codes of professional conduct, perhaps because these codes are written from the perspective of the individual member. This dilemma is addressed by stating these imperatives from the perspective of the organizational leader. In this context “leader” is viewed as any organizational member who has leadership or educational responsibilities. These imperatives generally may apply to organizations as well as their leaders. In this context “organizations” are corporations, government agencies, and other “employers,” as well as volunteer professional organizations. 3.1 Articulate social responsibilities of members of an organizational unit and encourage full acceptance of those responsibilities, Because organizations of all kinds have impacts on the public, they must accept responsibilities to society. Organizational procedures and attitudes oriented toward quality and the welfare of society will TT, Culture, and the Society BAL reduce harm to members of the public, thereby serving public interest and, fulfi illing social responsibility. Therefore, organizational leaders must encourage full participation in meeting social responsibilities as well as quality performance. 3.2 Manage personnel and resources to design and build information systems that enhance the quality of working life. Organizational leaders are responsible for ensuring that computer systems enhance, not degrade, the quality of working life. When implementing a computer system, organizations must consider the personal and professional development, physical safety, and human dignity of all workers. Appropriate human-computer ergonomic standards should be considered in system design and in the workplace. 3.3 Acknowledge and support proper and authorized uses of an organization’s computing and communication resources. Because computer systems can become tools to harm’ as’ well as to benefit an organization, the leadership has the responsibility to clearly define appropriate and inappropriate uses of organizational computing resources. While the number and scope of such rules should be minimal, they should be fully enforced when established. 3.4 Ensure that users and those who will be affected by a system have their needs clearly articulated during the assessment and design of requirements; later, the system must be validated to meet requirements, Current system users, potential users, and other persons whose lives may be affected by a system must have their needs assessed and incorporated in the statement of requirements. System validation should ensure compliance with those requirements. 183 S ho) ving in the Information Technology Era 3.5 Articulate and support policies that protect the dignity of users and others affected by a computing system. | Designing or implementing systems that deliberately or inadvertently demean individuals or groups is ethically unacceptable. Computer professionals who are in decision-making positions should verify that systems are designed and implemented to protect personal privacy and enhance personal dignity. 3.6 Create opportunities for members of the organization to learn the principles and limitations of computer - systems. he This complements the imperative on public ie . ye understanding (2.7). Educational opportunities dr, PP ad are essential to facilitate optimal participation of BS Pp Particip: aye all organizational members. Opportunities must 3st be available to all members to help them improve $y. their knowledge and skills in computing, including ab courses that familiarize them with the consequences th and limitations of particular types of systems. In particular, professionals must be made aware of the dangers of building systems around oversimplified models, the improbability of anticipating and designing for every possible operating condition, and other issues related to the complexity of this profession. 4, COMPLIANCE WITH THE CODE As an ACM member, I will ..., 4.1 Uphold and promote the Principles of this Code. The future of the computing profession depends on both technical and ethical excellence. Not only is it important for ACM computing professionals to adhere to the principles expressed in this Code, each member should encourage and support adherence by other members.

You might also like