SP REVIEWER
Part 1
ETHICS
Presented by: Jonathan S. Ramirez
At the end of this chapter, the student is expected to:
Discuss and differentiate ethical theories;
Determine the ethical theory which is the most appropriate
to be applied by a person in particular scenario;
Demonstrate the appropriate usefulness of a specific
ethical theory in a given case; and Examine moral problems, formulate conclusions and defend these
conclusions to disbelieving and yet open - minded audience.
learning objective
INTRODUCTION
The formal study of ethics goes back at least two thousand four hundred (2,400) years, to the Greek
philosopher Socratres. In the past two millennial, philosophers have proposed many ethical theories. In
this chapter, we review some of them. How do we decide if a particular theory is useful? A useful theory
allows its proponents to examine-moral problems, reach conclusions in front of a disbelieving, yet open-
minded audience.
The term “ethics” broadly describes the way in which we look at the understand life, in terms of good
and bad or right and wrong. It is a branch of knowledge that deals with moral principles. Moral theories
are the frameworks we use to justify or clarify our position when we ask ourselves “what should I do in
this situation?” or “what is right or wrong form me?” There are many moral theories and there is no one
right theory. They converge and often borrow from one another
(Wallace, Susan).
ETHICS
Ethics are external standards that are provided by institutions, groups, or culture to which an individual
belongs.
MORALS
Morals refer to an individual’s own principles regarding right and wrong.
I. Relativism
Relativism is the theory that there is no universal moral of right and wrong.
also Relativism have 2 particular kinds Subjective and Culture relativism
1.1 Subjective relativism
hold that each person decides right and wrong for himself/herself.
1.2 Cultural relativism
is the ethical theory that the meaning of “right” and “wrong” rests with a society’s
actual moral guidelines vary widely from place to place and from time to time.
II. DIVINE COMMAND THEORY
is the command theory is based on the idea that good actions are those aligned with the will of God and
bad actions are those contrary to the will of God.
III. ETHICAL EGOISM
is the philosophy that each person should focus exclusively on his or her self interest. In other words,
according to ethical egoism, the morally right action for a person to take in a particular situation is the
action that will provide that person with maximum long-term benefit.
IV. CONSEQUENTIALISM
“the end will justify the means.”
In Consequentialism, the consequence of an action justifies the moral acceptability of the means taken
to reach that end. It is the consequence of an action which determines whether or not the action is
moral. The result of the action prevail over any other consideration; simply stated, “the end justifies the
means.”Jeremy Bentham was an early and influential advocate of utilitarianism, the dominant
sequential position. A utilitarian believes in the “the greatest happiness for the greatest number.”The
more people who benefit from the particular action, the greater its good.
V. KANTIANISM
Deontology or Kantiasm is an obligation-based theory whose chief author was Immanuel Kant, who lived
in the 18th century. This theory emphasizes the type of action rather than the consequences of that
action. Deontologist believe that moral decisions should be made based on one’s duties and the rights of
others. According to Kant, morality is based on pure reason.
VI. PERSUASIVE POWER OF ETHICSS AND
THE LAW
It cannot be denied that the persuasive power of ethics and morals to every person is weak compared to
the persuasive power of the law.
Chapter II
Intended Learning Outcomes At the end of this chapter, the student is expected to:
• State the Code of Ethics of Filipino IT Professionals;
• Apply the Principles formulated by the Association of
Computing Machinery in dealing with other people, making judgement, in software designs and all other
dealings in the exercise of the IT profession;
• Explain the Ten Commandments of Computer Ethics;
• Identify problems in a work scenario;
• Be a morally responsible student; and
• Manifest ethical thinking skills in analyzing and justifying computing issues.
Professional code of ethics is a set of guidelines which are designed to set out acceptable behavior of
member of a particular group, association or profession.
Professional Code of Ethics
Professional Code of Ethics - Cont’d
Most codes of ethics created by professional organizations have two main parts: (a) outlines what the
organizations aspires to become, and (b) typically lists rules and principles by which members of the
organization are expected to abide. Many codes also include a commitment to continuing education for
those who practice the profession.
Professional Code of Ethics - Cont’d
Laws do not provide a complete guide to ethical behavior. Just because an activity is not defined as
illegal does not mean it is ethical. You also cannot expect a professional code of ethics to provide an
answer to every ethical dilemma — no code can be definitive collection of behavioral standards.
However, following a professional code of ethics can produce many benefits for the individual, the
profession and society as a whole:
1. Ethical Decision Making:
adherence to professional code of ethics means that practitioners use a common set of core values and
beliefs as a guideline for ethical decision making.
Professional Code of Ethics - Cont’d
2. High Standards of Practice and Ethical Behavior:
adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be
tempted to compromise to meet the pressures of day-to-day business.
3. Trust and Respect from the General Public:
public trust is built on the expectation that a professional will, behave ethically. People must often
depend on the integrity and good judgments of a professional to tell the truth, abstain from giving self-
serving advice, and offer warnings about the potential negative side effects of their actions.
4. Evaluation Benchmark:
a code of ethics provides an evaluation benchmark that a professional can use as a means of self-
assessment.
Code of Ethics of the Filipino IT Professionals
1. I will promote public knowledge, understanding and appreciation of Information Technology.
2. I will consider the general welfare and public welfare and public good in the performance of my work.
3. I will advertise goods or professional services in a clear and truthful manner.
4. I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in
respect of Information Technology.
5. I will accept the full responsibility for the work undertaken and utilize my skills with competence and
professionalism.
Code of Ethics of the Filipino IT Professionals - Cont’d
6. I will make truthful statements on my areas of competence as well as the capabilities and qualifies of
my product and services
7. I will not disclose or use any confidential information obtained in course of professional duties
without the consent of the parties concerned except when required by the laws.
8. I will strive to attain the highest quality in both the products and services that offer.
9. I will knowingly participate in the development of the Information Technology.
10. I will uphold and improve the IT professionals standard through continuing profession in order to
enhance the IT profession.
Code of Ethics of Association of Information Technology Professionals (AITP)
I acknowledge:
That I have obligation to management, therefore, I shall promote the understanding of information
processing methods and procedures to management using every resource at my command.
That I have an obligation to my fellow members, therefore, I shall uphold the high ideals of AITP as
outlined in the Association Bylaws. Further, I shall cooperate with my fellow members and shall treat
them with honesty and respect at all times.
Code of Ethics of Association of Information Technology Professionals (AITP) - Cont’d
That I have an obligation to society and I will participate to the best of my ability in the dissemination of
knowledge pertaining to the general development understanding of information processing. Further, I
shall not use knowledge of a confidential nature to further my personal interest, nor shall I violate the
privacy and confidentiality of information entrusted to me or to which I may gain access.
That I have an obligation to my College or University, therefore, I shall uphold its ethical and moral
principles.
Code of Ethics of Association of Information Technology Professionals (AITP) - Cont’d
That I have an obligation to my employer whose trust I hold, therefore, I shall endeavor to discharge this
obligation to the best of my ability, to guard my employer's interests, and to advise him or her wisely
and honestly.
That I have an obligation to my country, therefore, in my personal, business, and social contacts, I shall
uphold my nation and shall honor the chosen way of life of my fellow citizens.
I accept these obligations as a personal responsibility and as a member of this Association. I shall actively
discharge these obligations and I dedicate myself to that end.
Principles
Principle 1: Public
Software engineers shall act consistently with the public interests In particular, software engineers shall,
as appropriate:
1.01 Accept fully responsibility for their own work.
1.02 Moderate the interests of the software engineer, the employer, the client and the users with the
public good.
1.03 Approve software only if they have well-founded belief that is safe, meets specifications, passes
appropriate tests, and does not diminish quality of life, diminish privacy or harm the environment. The
ultimate effect of the work should be for the public good.
1.04 Disclose to appropriate persons or authorities any actual or potential danger to the user, the public
or the environment, that they reasonably believe to be associated with software or related documents.
Principles
Principle 1: Public - cont’d
1.05 Cooperate in the efforts to address matters of grave public concern caused by software, its
installation, maintenance, support or documentation.
1.06 Be fair and avoid deception in all statements, particularly public ones, concerning software or
related documents, methods and tolls.
1.07 Consider issues of physical disabilities, allocation of resources, economic disadvantage and other
factors that can diminish access to the benefits of software.
1.08 Be encouraged to volunteer professional skills for good causes and contribute to public education
concerning the discipline.
Principles
Principle 2: Client and Employer - cont’d
Software engineers shall act in a manner that is in the best interests of their client and employer,
consistent with the public interest. In particular, software engineers shall, as appropriate:
2.01 Provide service in their areas of competence, being honest and forthright about any limitations of
their experience and education.
2.02 Not knowingly use software that is obtained or retained either illegally or unethically.
2.03 Use the property of the client or employer only in ways properly unauthorized, and with the clients
or employer's knowledge and consent.
Principles
Principle 2: Client and Employer - cont’d
2.04 Ensure that any document upon which they rely on has been approved, when required, by
someone authorized to approve it
2.05 Keep private any confidential information gained in their professional work, where such
confidentiality is consistent with the public interest and consistent with the law.
2.06 Identify, document, collect evidence and report to the client or the employer promptly if, in their
opinion, a project is likely to fail, to prove too expensive, to violate intellectual property law or
otherwise to be problematic.
2.07 Identify, document and report significant issues of social concern, of which they are aware, in
software or related documents, to the employer or the client.
Principles
Principle 2: Client and Employer - cont’d
2.08 Accept no outside work detrimental to the work they perform for their primary employer.
2.09 Promote no interest adverse to the employer or client, unless a higher ethical concern is being
compromised; in that case, inform the employer or another appropriate authority of the ethical
concern.
Principles
Principle 3: Product
Software engineers shall ensure that their products and related modifications meet the highest
professional standards possible. In particular, software engineers shall, as appropriate:
3.01 Strive for high quality, acceptable cost and a reasonable schedule, ensuring
significant tradeoffs are clear to and accepted by the employer and the client, and are
available for consideration by the user and the public.
3.02 Ensure proper and achievable goals and objectives for any project on which they work or propose.
3.03 Identify, define and address ethical, economic, cultural legal and environmental issues related to
work projects.
Principles
Principle 3: Product - cont’d
3.04 Ensure that they are qualified for any project on which they work or propose to work to an
appropriate combination of education and training, and experience.
3.05 Ensure That appropriate method is used for any project on which they work or
propose to work.
3.06 Work to follow professional standards, when available, that are most appropriate
for the task at hand, departing from these only when ethically or technically justified.
3.07 Strive to fully understand the specifications for software on which they work.
Principles
Principle 3: Product - cont’d
3.08 Ensure that specifications for software on which they work have been well
documented, satisfy the user's requirements and have the appropriate approvals.
3.09 Ensure realistic quantitative estimates of cost, scheduling, personnel, quality and
outcomes on any project on which they work or propose to work and provide an
uncertainty on any project on which they work or propose to work and provide an
uncertainty assessment of these estimates.
3.10 Ensure adequate testing, debugging, and review of software and related
documents on which they work.
Principles
Principle 3: Product - cont’d
3.11 Ensure adequate documentation, including significant problems discovered and
solutions adopted, for any project on which they work.
3.12 Work to develop software and related documents that respect the privacy of those
who will be affected by that software.
3.13 Be careful to use only accurate data derived by ethical and lawful means and use it
only in ways properly authorized.
3.14 Maintain the integrity of data, being sensitive to outdated or flawed occurrences.
3.15 Treat all forms of software maintenance with the same professionalism as new
development.
Principles
Principle 4: Judgment
Software engineers shall maintain integrity and independence in their
professional judgment. In particular, software engineers shall, as appropriate:
4.01 Temper all technical judgments by the need to support and maintain human
values.
4.02 Only endorse documents either prepared under their supervision or within
their areas of competence and with which, they are in agreement.
4.03 Maintain professional objectivity with respect to any software or related
documents they are asked to evaluate;
Principles
Principle 4: Judgment - cont’d
4.04 Not engage in deceptive financial practices such as bribery, double billing,
or' other improper financial practices;
4.05. Disclose to all concerned parties those conflicts of interest that cannot
reasonably be avoided or escaped.
4.06 Refuse to participate, as members or advisors in a private, governmental
or professional body concerned with software related issues, in which they,
their employers or their clients have undisclosed potential conflicts of interest.
Principles
Principle 5: Management
Software engineering managers and leaders shall subscribe to and promote an
ethical approach to the management of software development and maintenance. In
particular, those managing or leading software engineers shall, as appropriate:
5.01 Ensure good management for any project on which they work, including effective
procedures for promotion of quality and reduction of risk.
5.02 Ensure that software engineers are informed of standards before being held to
them.
5.03 Ensure that, software engineers know the employer’s policies and procedures
for protecting passwords, files and information that is confidential to the employer
or confidential to others.
Principles
Principle 5: Management - cont’d
5.04 Assign work only after taking into account appropriate contributions of
education and experience tempered with a desire to further that education and
experience.
5.05 Ensure realistic quantitative estimates of cost, scheduling, personnel, quality
and outcomes on any project on which they work or propose to work and provide an
uncertainty assessment of these estimates.
5.06 Attract potential software engineers only by a full and accurate description of
the conditions of employment.
5.07 Offer fair and just remuneration.
.
Principles
Principle 6: Profession
Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest. In particular, software
engineers shall, as appropriate:
6.01 Help develop an organizational environment favorable to acting ethically.
6.02 Promote public knowledge of software engineering.
6.03 Extend software engineering knowledge by appropriate participation in
professional organizations, meetings and publications.
Principles
Principle 6: Profession - cont’d
6.04 Support, as members of a profession, other software engineers striving
to follow this Code.
6.05 Not promote their own interest at the expense of t employer he
profession, client or employer
6.06 Obey all laws governing their work, unless in exceptional circumstances,
such compliance is inconsistent with the public interest.
6.07 Be accurate in stating the characteristics of software on which the
work, avoiding not only false claims but also claims that might reasonably be
supposed to be speculative, vacuous, deceptive, misleading or doubtful.
Principles
Principle 6: Profession - cont’d
6.08 Take responsibility for detecting, correcting and reporting errors in
software and associated documents on which they work.
6.09 Ensure that clients, employers and supervisors know of the software
engineer’s commitment to this Code of ethics and the subsequent
ramifications of such commitment.
6.10 Avoid associations with businesses and organizations which are in
conflict with this code.
6.11 Recognize that violations of this Code are inconsistent with being a
professional software engineer.
Principles
Principle 6: Profession - cont’d
6.12 Express concerns to the people involved when significant violations of
this Code are detected unless this is impossible, counter-productive, or
dangerous.
6.13 Report significant violations of this Code to appropriate authorities when
It is clear that consultation with people involved in these significant violations
is impossible counter-productive or dangerous.
Principles
Principle 7: Colleagues
Software engineers shall be fair to and supportive of their colleagues. In
particular, software engineers shall, as appropriate:
7.01 Encourage colleagues to adhere to this Code.
7.02 Assist colleagues in professional development.
7.03 Credit fully the work of others and refrain from taking undue credit.
7.04 Review the work of others in an objective, candid and properly
documented way.
Principles
Principle 7: Colleagues - cont’d
7.05 Give a fair hearing to the opinions, concerns or complaints of a colleague.
7.06 Assist colleagues in being fully aware of current standard work practices
including policies and procedures for protecting passwords, files and other
confidential information and security measures in general.
7.07 Not unfairly intervene in the career of any colleague; however, concerns of
the. employer the client or public interest may compel software engineers in
good faith to question the competence of a colleague.
7.08 In situations outside of their own areas of competence call upon the
opinions of other professionals who have competence in that area.
Principles
PPrinciple 8: Self
Software engineers shall participate in lifelong learning regarding the
practice of their profession and shall promote an ethical approach to the
practice of the profession. In particular, software engineers shall continually
endeavor to:
8.01 Further their knowledge of developments in the analysis, specification,
design, development, maintenance and testing of software and related
documents, together with the management of the development process.
8.02 Improve their ability to create safe, reliable, and useful quality software
at reasonable cost and within a reasonable time.
Principles
PPrinciple 8: Self -cont’d
8.03 Improve ability to produce accurate, informative, and well-written
documentation.
8.04 Improve their understanding of the software and related documents on
which they work and of the environment in which they will be used.
8.05 Improve their knowledge of relevant standards and the law governing
the software and related documents on which they work.
8.06 Improve their knowledge of this Code, its interpretation and its
application to their work.
Principles
PPrinciple 8: Self -cont’d
8.07 Not give unfair treatment to anyone because of any irrelevant
prejudices.
8.08 Not influence others to undertake any action that involves a breach of
this Code.
8.09 Recognize that personal violations of this Code are inconsistent With
being a professional software engineer.
The Ten Commandments
The Ten Commandment of computer ethics have been defined by the
Computer Ethics Institute. Here is our interpretation of them:
I. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
The Ten Commandments – CON’T
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without
authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you
write.
10. Thou shalt use a computer in ways that show consideration and
respect.
The Hacking Community's Constitution
1. We believe: That every individual should have the right to free speech in
cyber space.
2. We believe: That every individual should be free of worry when pertaining
to oppressive governments that control cyber space.
3. We believe: That democracy should exist in cyber space to set a clear
example as to how a functioning element of society can prosper with equal
rights and free speech to all.
.
The Hacking Community's Constitution -
CONT’D
4. We believe: That hacking is a tool that should and is used to test the
integrity of networks that hold and safe guard our valuable information. ,
5. We believe: Those sovereign countries in the world community that do
not respect democracy should be punished.
6. We believe: That art, music, politics, and crucial social elements of all
world societies can be achieved on the computer and in cyber space.
The Hacking Community's Constitution -
CONT’D
7. We believe: That hacking, cracking, and phreaking are instruments that
can achieve three crucial goals:
a. Direct Democracy in cyber space.
b. The belief that information should be free to all.
C. The idea that one can test and know the dangers and exploits of
systems that More the individuals' information.
.
The Hacking Community's Constitution -
CONT’D
8. We believe: That cyber space should he a governing body in the world
community, where people of all nations and cultures Can express their
ideas and beliefs as to how our world politics should be played.
9. We believe: That there should be no governing social or political class or
party in cyber space.
10. We believe: That the current status of the Internet is a clear example
as to how many races, cultures, and peoples can communicate freely and
without friction or conflict.
The Hacking Community's Constitution -
CONT’D
11. We believe: In free enterprise and friction free capitalism.
12. We believe: In the open source movement fully, as no government should
adopt commercial or priced software for it shows that a government may
be biased to something that does not prompt the general welfare of the
technology market and slows or stops the innovation of other smaller
company's products.
13. We believe: That technology can be wielded for the better placement of
man kind and the environment we live in.
The Hacking Community's Constitution -
CONT’D
14. We believe: That all sovereign countries in the world community should
respect these principles and ideas released in this constitution.
The above declared constitution is like the bill of rights which should be
read in relation to the ten commandments.
What is Computer Ethics?
The term "computer ethics" is open to interpretations both broad and
narrow. On one hand, for example, computer ethics might be
understood very narrowly as the efforts of professional philosophers
to apply traditional ethical theories like utilitarianism, Kantianism, or
other moral theories to issues regarding the use of computer
technology.
Problem in Computer Ethics
A typical problem in Computer Ethics arises because there is a policy
vacuum about how computer technology should, be used. Although a
problem in Computer Ethics may seem clear initially, a little reflection
reveals a conceptual muddle.
Moor said that computer technology is genuinely revolutionary because it
is "logically malleable":
Logical Malleability:
Computers can be shaped and molded to perform any activity that can be
characterized in terms of inputs, outputs and connecting logical
operations.
Impact on Society:
The extensive impact of computerization on society is clear. Naturally, in
1985, when Moor wrote his paper, relatively few could foresee the extent
of that impact, nor did anyone envisage the-Internet and the World Wide
Web. Moor did, however, foresee the changing workplace, and the nature of
work:
Invisibility Factor
An important fact about computers is that most of the time, and under
most conditions, computer operations are invisible.
1. Invisible Abuse:
Moor describes this as: "the intentional use of the invisible operations of a
computer to engage in unethical conduct."
2. Invisible Programming Values:
These values become embedded in the final product and may be
invisible to someone who runs the program.
3. Invisible Complex Calculation
Computer today are capable of enormous calculations beyond human
comprehension. Even if a program is understood, it does not follow that
the respective calculations are understood.
Three "Levels" of Computer Ethics"
Computer ethics questions can be raised and 'studied at various "levels."
And each level is vital to the overall goal of protecting and advancing
human values.
This is the overall goal of what some call "pop" computer ethics.
The second "level" of computer ethics can be called "para'' computer
ethics.
The third level of computer ethics I call "theoretical" computer ethics
Moral Responsibilities of Computer Professionals
Some ethicists believe that all professionals, regardless of their practice,
have special moral obligations as professionals.
SOCIAL NETWORKING SITES
Philippines is the social media capital. As proof, Makati city takes the
most selfies than anywhere in the world. At; Internet penetration
increases in the Philippines, it seems that Filipinos have grown fond of
using apps such as WeChat, Line, Skype, and Facebook Messenger
Social Networking Ethical Issues
Obviously, if we have hundreds of millions of users of one
social networking site, it will be almost impossible that ALL of
these users will abide by the golden rule. We, Filipinos, are very
good in turning our national problems into a joke expressed in
a picture message published in social networking sites.
Posting a Picture Message
The above pictures may be just fine because it is entertaining.
But what if your friend post your picture which, to your mind
should not be seen by others, will that be OK with you? Hence,
as a rule of thumb, netizens should NOT post a picture which
may be offensive to some person(s) included in the picture. Of
course, if the picture is on its face, a good picture, we do not
need to get the consent of everyone.