пятница, 27 июля 2012 г.


  Assignment Part 2

The ACM Scetch


Two scenarios have been shooted in order to demonsrate the meaning of two code of conducts chosen, which are "Be Honest and Trustworthy" and "Respect Privacy of Others".


The first scenario was shooted according to "Be Honest and Trustworthy" code of conduct. In this scenario one girl wants to hire good developers in order to implement her brilliant idea. Once a day, while "googling" different ads, she found programmers and decided to call them. They negotiated to do the programm in one month and charged RM 10 000 and asked to pay RM5000 in advance as a deposit. But after one month, two programmers didn't do anything and wasted her money. 

From, this video we can conclude that any professional must be honest whenever and whatever reason he/she has.





The second scenario is about Respecting Privacy of others. In this scenario a lecturer in the class announced about upcoming difficult test. He downloaded test questions on his PC, but suddenly his phone rang and he said that he has to go. In the rushing to the important meeting he forgot to switch of the PC. Students by knowing that illegaly copied all questions of the test from his PC. 

That was very unethical behaviour in the relation of private data of the lecturer.






понедельник, 25 июня 2012 г.

Academic Writing Assignment 1


Importance of Ethics among the IT professionals


         Abstract

As a whole world going through the process of globalization, from different aspects of life and social and professional requirements the proper behavior of a person comes to the top places. What do we understand under the word “proper”? Even from the old times people or the society as a whole has been paying a big attention on how and why certain man should deal within his environment. And all of that rules are not under laws or constitution, which are dictated by government or judges. The good and right behavior of a person in different situations derives from his moral or society ethics. The paper describes the term ethic and discusses important of ethics in the professional environment, especially in Information Technologies field. 

        Introduction

Technology today allows doing things that were considered impossible few years ago. Data in large volumes can be processed and passed to another place over the world in few minutes. Giant data warehouses store data about everything, including confidential data about finance, politicians. This rapid development in computer technology has increased the risk of misuse of technology. We can always read the news on the bad impacts of technology such as a cardholder’s personal account been hacked and illegal music, movie, software downloads. The common issues faced by the social today are mostly security and privacy concerned. As technology has a significant impact to the world, this impact may be either positive or negative. Which type of impact it will cause depends on people developing this technology.  Therefore, being a responsible ethical IT professional is important.


First of all, let us understand these two words, ethics and professionals.The term “ethics” is originated from a Greek word “ethos” which means character.Ethics can be defined as a set of rules or standards governing the behavior of a person or members of a profession.What is profession? According to George W. Reynolds (2009), “a profession is a calling that requires specialized knowledge and often long and intensive academic preparation”. In another word, people can be considered as professionals if they undergo some experiences and training, practicejudgment in their working environment and their works are not standardized.

Literature Review


Each field has its own settled rules of ethics. For example, doctors shall abide the rule of patient’s confidentiality, engineers shall hold paramount the safety, health, and welfare of the public (NSPE, 2006). IT professionals also have their own Code of Conduct. Professional societies and institutions are setting standards for professions in order to standardize their behavior in different situation. Big organizations like the ACM, the IEEE (Institute of Electrical and Electronic Engineers), and the British Computer Society set the code of professional conduct where they consider behavior of professionals from different sides of social issues. According to this Code of Ethics there are eight principles which should be adhered by IT professions. These principles describe the way how professions should behave with public, client, employee, and colleague, as well as do product, judgment, management, and self – principles in order to act as a profession (Gotterbarn, 1999). According to this Code IT professionals should understand that their job requires not only possessing technical skills but also behaving in ethical and morally responsible way in order to be respectful professional. There is a set of rules which are forbidden by laws. For instance, plagiarism, spread of viruses, downloading and uploading pirate audio or video, and many others. Different countries punish these violates differently, for example, violation of privacy in India is punished with imprisonment which may extend to three years, cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life (cyberlawsindia.net, 2008). But we are not discussing the issues of legality. Our paper considers kind of behavior which are not bound by law but more by ethics. For example, IT professional should respect confidentiality of clients and ensure that intellectual property of his clients is protected, should not misuse a computer and knowingly accept a work that is not in his competence even if it is not punished by law. Behavior that is illegal always considered as unethical, but there are behaviors that are legal but still considered unethical. Only those who follow all legal and ethical rules can be called respectful IT professionals (Feldt, Dodig-Crnkovic, 2008).


In professional lives, people encounter with different types of dilemmas. For example, participation in the development of nuclear systems and weapons . Some people strongly refuse to work on kind of systems related with military. But others can accept it as they think that national security is more important. Answers, reactions to these questions are important because consequences of these situations can lead to potential damages. Another example in working environment is when you cannot deliver a product on time to the client because of defects and some components of product need to be modified and checked out again. But your manager is requiring you to deliver it anyway because he does not want to lose money. The dilemma here is that if you follow the order of your manager, the product later will damage the system of your customer. But if you do not follow and tell about defects to customer, you will violate the rule of keeping competence of your employer. When facing with such ethical dilemmas, Sommerville (2011) advices “tomake up your own mind”, listen for your intuition. Also while applying rules of Conduct you should keep in mind particular individuals and the nature of disagreement. Because each case is unique and not all possible situations are predefined in this Code.
From what is discussed above, why is it important to adhere to ethical standards in IT? First, IT is not just concerned with the development of innovative technologies, systems, and applications. It requires communication between IT personnel on one side and customers on another side in order to develop it. For example, programmer has to communicate with his clients to identify system requirements in order to deliver acceptable system. Ethics promote the values for good communication, such as mutual respect, trust, and fair work. Second, IT usually involves different professionals from different spheres, especially in groups developing big systems. Ethical standards may provide values for cooperation and collaboration in healthy work environment.

          Conclusion

          If summarize, ethics is one of the important side of human being at any time and place. General rules and principles of ethics take place in many situations, in the everyday life as well as in the professional environment. The main essential is how you would behave in such situation, will be indicator of your social status, level of respect and professional concern. As discussed in this paper above, professional ethic plays important role in IT sphere too.  In the time of today’s globalization, when simple computer is getting one of the integral part of almost all people, the terms ethics in IT, intellectual property, virtual communication etc. come to first place. Therefore IT professionals have to know how to deal not only with machines, but with rapid developing society and its components. Any IT professional should take responsibility on harmful and illegal actions on the Internet and attempt to protect other Internet users and owners of the intellectual property.  

Refernces:


Cyber Law in India. 2008. Retrieved 23, June 2012 from http://www.cyberlawsindia.net/cyber-india.html   


Curricula. Retrieved June 22, 2012 from http://mdh.academia.edu/GordanaDodigCrnkovic/Papers/1050522/Professional_and_Ethical_Issues_of_Software_Engineering_Curricula


Feldt, R., Dodig-Crnkovic, G. (2008). Professional and Ethical issues of Software Engineering. Pearson Education. 


Gotterbarn, D., Miller, K. and Rogerson, S. (1999). Software Engineering Code of Ethics. Approved. Comm. ACM, 42(10), 102-7.


National Society of Professional Engineers (2006). Code of Ethics for Engineers. Retrieved June 22, 2012  from http://www.onlineethics.org/Resources/ethcodes/EnglishCodes/9972.aspx


Reynolds, G.W. (2009). “Ethics in Information Technology”, 3rd Edition, Couse Technology,
Cengage Learning. Retrieved June 21, 2012 from http://books.google.com.my/books?id=xZhwj4VjHfkC&source=gbs_navlinks_s


Sommerville, I. (2011). Software Engineering, 9th edition. Pearson Education.

воскресенье, 24 июня 2012 г.

        Symposium of IT Governance, Management and Audit 2012


         Symposium on IT Governance, Management and Audit (SIGMA) 2012 is held on 20th June which is organised by Department of Information System, one of the departments from College of Information Technology (COIT) Universiti Tenaga Nasional (UNITEN) and co-operated with ISACA Malaysia Chapter. The theme for this year is “Governing the Future. TAKE CHARGE”. The purpose of this symposium is to gather the people in the same industry to share their new researches and exchange their ideas. The symposium consists of keynote sessions and paper presentations. We have attended the Track 1 paper presentations which is all about IT governance, framework implementation, control methodologies and compliance issues in organization. There are four papers have been presented. However, we found that the third paper “A study in the challenges of Jordan public health care governance: A case study in HAKEEM implementation” is interesting.

Hakeem is electronic health record system which is oriented to the people of Jordan. The word Hakeem was derived from Arab language, which means “doctor”. Hakeem consist of three phases, however for a while, the system is under the construction by being in the second phase. The main functionalities of the system are: 

  • To provide a good and quality service for patients.
  • To control the cost of the service.
  • To provide patients with safety recovery and satisfaction of the treatment. 
       Nowadays, in the world with worse ecology, impure airs the most of people encounter with different types of diseases. However, medical clinics are disabling to serve all of them immediately, because of low workload (the ratio of medical professionals to patients is low) and paper based works which take so much time. However, Hakeem allows solving these problems, transferring all paper based work to computer based system. Nevertheless, for implementing such big system, the most requirements are good performance, easy to use and learn also prevention for crush of the system if it happens as well as working and keeping safeness of big amount of data. But today manager and system analyst encounter with problems such as:
  •     Financial – amount of budget for implementation, training, maintenance and support.
  •     Policy and legislation – security and privacy.
  •     Technology – working with huge amount of data, lack of software and hardware

            In the conclusion, this topic was useful for us as well as other three papers presented within our track. We were participants of the big event like a Symposium, gained experience from professionals and seniors. Along with knowledge in IT governance sphere, we got the idea about how others create presentations, defend their topic and behave in front of audience. And all of that was performed in ethical way, which is very important for us as well as for any future professional. 
Group Members Introduction




  
Alibek Sabraliyev
               Leader


ID:       SN089104
email:  a.sabraliyev@gmail.com
           Shnara Amangaliyeva


                 ID:IS089103
                email: s.amangaliyeva@gmail.com
Magzhan Kayranbay


ID: SW089111
email: magzhan.kairanbay@gmail.com

Low Jia Yen


ID: GM085713
email: yen2low@gmail.com





Askar Alimkhanov


ID: IS089110
email: askaralimkhanov@gmail.com
Fatemeh Sadeghi Goughari


ID: 086791
email: queencity666@yahoo.com