Thursday, 17 November 2011

Part 2 - Case Study

Part 2 : Case Study

Your team is to study the given scenario and critically address the questions that follow:
Case Study
            You are the senior software engineer at a start-up company developing an exciting new  product for handheld computers that will revolutionize the way nurses keep track of the hospitalized patients. Your company’s sales force has led hospital administrators to believe your product will be available next week. Unfortunately, at this point the package still contains quite a few bugs. The leader of the testing group has reported that all of the known bugs appear to be minor, but it will take another month of testing for his team to be confident the product contains no catastrophic erros.
            Because of the fierce competition in the medical software industry, it is critical that your company be the “first to market”. To the best of your knowledge, a well-established company will release a similar product in a few weeks. If its product appears first, your start-up company will probably go out of business.

Questions
1.      Should you recommend release of the product next week?
2.      Who will benefit if the company follows your recommendation?
3.      Who will be harmed if the company follows your recommendation?
4.      Do you have an obligation to any group of people that may be affected by your decision?
5.      Identify and match the ACM code of ethics that relate to this scenario.


Friday, 11 November 2011

Answer for Assgmt Week 8

Question 1

Many cell phones now come equipped with cameras. Managers of health clubs are concerned that people in locker rooms may be secretly photographed by other members carrying small cell phones. What do you think about this? Discuss your answer based on one ethical principle of your choice.

Capture the picture secretly without permission others was an act that not moral. This act although not known by others but it is still wrong and not respect the privacy of others and as a consequence of the use of sophisticated tools such as small cell phones. The managers of health clubs are concerned that people in locker rooms maybe secretly photographed by other members carrying small cell phones. If the health clubs' method of banning cellular phones probably decreases the chance of having a picture taken of you while you are working out, there are problems to this solution.  

Firstly, it punishes many for the actions of few.  For every person that has used a cell phone to take pictures in a health club of someone who is unaware, there are hundreds that now cannot bring their phone into the gym, causing them to potentially miss calls. Secondly, this measure will not completely eliminate the problem. Presumably, the people taking the pictures were covert and tried to avoid being caught taking the pictures. It would be hard to identify and stop someone from bringing in a cell phone if he was determined to bring it in. Finally, health clubs are private organizations with members that choose to go there.  This allows the health clubs to create rules that ban cell phones.  Health clubs that do impose this rule can even use it to help market their gym since people that are concerned about privacy might enjoy having the protection of the ban while they are working out.  

However, there are many other places where people would probably not want to be photographed that cannot adopt a cell phone ban just because they are concerned about the privacy threat imposed by the cameras.  Many high schools require that students take a number of PE classes in which the students must dress out in the locker rooms.  

Judging from our own experience, a large majority of high school students have their own cell phones, and it is impractical for the school to place a ban on them.  Students need them in order to contact their parents or friends to arrange for a ride home or to coordinate other activities.  Perhaps a better solution than an all out ban on cell phones in certain areas is to impose a rule against taking pictures in the area with the promise of a strict punishment if the rule is broken.  While a ban on cell phones might be impractical in a high school, how many students would risk expulsion or a fine just to take a picture of a classmate?


Laws banning the use of cellular phones are taking away freedom. When private organizations create rules banning cell phones it is acceptable because citizens can choose whether or not they want to patronize the organization.  However, when a government organization, like a high school, bans cell phones the citizens have no choice but to loose their freedom.  

The responsibility of policy makers is to determine if the threat to personal privacy because of the possibility of a picture being taken is worth the loss of freedom.  As we have pointed out above, there are alternatives to banning cell phones that emphasize strict punishment for actual privacy violators and allow greater freedom for the average citizen. Another possible way to intrude on someone's privacy is through auditory eavesdropping. Indeed, a lot of the fancy technology employed by government agencies to monitor and spy on people is sound equipment.  Whether it is hidden microphones in The Italian Job, parabolic sonar dishes in Enemy of the State or even lasers that can read the vibrations of windows to record a conversation, popular culture and the real world are filled with methods to listen in on other peoples' conversations   (  “Listening in on Block Talk”).   One thing that is important to note about eavesdropping is that most of the complaints and problems with it more tangible than the problems with pictures and video. The most common problem people seem to have with being photographed or video taped without their knowledge is a loss of dignity, because they might be photographed doing something embarrassing, they could be in a compromising position, or their body could be exposed to someone whom they did not wish to see it.  

However, the effects of listening in on somebody's conversations can be much more serious.  For instance, if there is an information leak to the media, the informant's identity could be compromised by audio wiretapping.  The right of the press to not reveal its informants' identities has long been an important value in America. Without these informants, politicians would be able to get away with scandalous behavior because there would not be anyone on the inside passing information to the press and the voters.  One such example is William Felt, otherwise known as Deep Throat, who was Woodward and Bernstein's informant during the Watergate scandal.  It is possible that without the cover of secrecy, Felt and other such informants would not have cooperated with the press and leaked sensitive information.  


Question 3


Refer to the lecture slide for this week on Intellectual Property.  Explain with example the following:


Copyrights is a statutory right to stop others copying or exploiting authors’ works in various other ways without permission. Copyright provides owner with five rights which are reproduction, distribution, public display, public performance and production of derivative works. The length of the protection is defined by copyright laws.

Patents is a document issued by the government office which describes the invention and creates a legal situation in which the patented invention can normally only be made, used, sold, imported by or with the authorization of the patentee.
Trademarks is A distinctive word, phrase, symbol, or design that identifies a product and is legally owned by its manufacturer or inventor. Abbreviation, TM.


Trade secrets may consist of any formula, pattern, device or compilation of information which is used in a business, and which may give an advantage over competitors who do not know the trade secret. A trade secret may be a formula for a chemical compound, a process of manufacturing, treating or preserving materials, a pattern for a machine or other device, or even a list of customers. Trade secrets are different from other business secrets. For example, the amount or other terms of a secret bid for a contract or the salary of certain employees, or the security investments made or contemplated, or the date fixed for the announcement of a new policy or for bringing out a new model.


Question 4

Discuss software duplicating from the perspectives of act utilitarianism.

Act utilirianism :
If the majority are happy and the benefits are higher, it is considered ethical regardless the consequences.

Software duplication :
Software duplication is a process that take a copy of software and insert into disk or any hard drive that can act as a storage without any legal consent.

Pros:
-everyone can use the software for free and without having to pay high price.
-easy to disseminate among community.
-easy to modified based on users' needs.

Cons:
-loses in term of financial to the company.
-the competitors and people can easily modify and make profit for it self.
-someone might claim the software to be his own.
-company will lost their customers' trust.
-unable to remain competitive in the market.

Therefore, according to act utilirialism, software duplication is unethical.


Week 8 ( group exercise)

Each Team is to work on the questions during today’s class and upload the answer through their blog by Friday 11th November, 5 PM. It is recommended that the teams finalize this assignment during the class time and not take it outside the designated learning time for this week. You need NOT MORE than 2 hours to get this done. Manage your time right. You need not send any email to indicate that you have updated your blog.

1. Many cell phones now come equipped with cameras. Managers of health clubs are concerned that people in locker rooms may be secretly photographed by other members carrying small cell phones. What do you think about this? Discuss your answer based on one ethical principle of your choice.

2. Before offering a job candidate a position, some potential employers do a criminal background check of the candidate. What are the pros and cons of this policy? Is this ethical? Discuss your answer based on one ethical principle of your choice.

3. Refer to the lecture slide for this week on Intellectual Property. Explain with example the following:
o Copyrights
o Patents
o Trademarks
o Trade secrets

4. Discuss software duplicating from the perspectives of act utilitarianism

Monday, 31 October 2011

Session with IT Professionals





A session with three IT professionals from InternetNow, TIME Engineering Berhad and HP very interesting with full knowledge. What we learn from this session is when to developed something or do the something we must have WHAT aims to point the right direction what to learn and encourage life long learning. And WHY stand by what knowledge can we share with my community. HOW when you should try note down for example in the flow of software development. Furthermore we learn about Professionalism. Its all about public’s perception of software development as an engineering field. Professionalism is responsible and accountable. How to take responsibility and the steps.

We also can learn about how to land that dream job that you resume must hand out with the content a good internship and pet projects.When in interview that resume can be backed up. Session with TIME Engineering Berhad talk about IT infrastructure and managed services provider including Cyber Security,Data Center,Business Application and Services and more. There is also talk about key characteristic IT Industry Job Market included change and evolution,Fast-paced,high growth and Borderless and global.Among the most important topic is self development and key to be success is creadibility to obtain professional certifications,must know the right people and share and focus on your skills and stay ahead.All the topic many more give us the knowlegde and all the topic can be relate to Social and Professional Issues that professionalism which can control behaviour based on moral and responsibility.




Part1-Academic Paper & Presentation

ACADEMIC PAPER

The Importance of Ethics among IT professionals.

The importance of ethics among the IT professional are divide in six categories which are intellectual property, privacy, lifestyle, work, wealth, and health.

Intellectual property (IP) refers to a number of distinct types of creations of the mind for which a set of exclusive rights are recognized and the corresponding fields of law associated with it. Under IP law, the owners are granted certain exclusive rights to a variety of intangible assets such as musical, literary and artistic works, discoveries and inventions and words, phrases, symbols and designs. Common types of intellectual property rights include copyrights, trademarks, patents, industrial design rights and trade secrets for some jurisdictions. It can be summarized that intellectual property refers to creations of the mind such as inventions, literary and artistic works and symbols, names, images and designs used in commerce.

Intellectual property is divided into two categories which are industrial property and copyright. Industrial property includes inventions (i.e patents), trademarks, industrial designs and geographic indications of source. Copyright includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures and architectural designs. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings and those of broadcasters in their radio and television programs. Just like other kinds of property, intellectual property needs to be protected from unauthorized use. There are four ways to protect different types of intellectual property which are explained below.
1.      Patents – Provide rights for up to 20 years for inventions in three broad categories
a.       Utility patents – Protect useful processes, machines, articles of manufacture and compositions of matter.
b.      Design patents – Guard the unauthorized use of new, original and ornamental designs for articles of manufacture.
c.       Plant patents – Protect invented, discovered or asexually produced plant varieties.
2.      Trademarks – Protects words, names, symbols, sounds or colours that distinguish goods and services. Trademarks can be renewed forever as long as they are being used in business
3.      Copyrights – Protects works of authorship, such as writings, music and works of art that have been tangibly expressed.
4.      Trade secrets – Information that companies keep secret to give them an advantage over their competitors.

In privacy sector, IT technology allows businesses to gather information and it must balance the needs of those who use this information against the privacy rights of those people whose information may be used. Systems collect and store key data from every interaction with customers likes purchasing habits, contacts, search terms, etc. Also, there are many objects to data collection policies of government and business for instance, strips people of the power to control their own personal information.

The lack of consumer confidence in information privacy has been identified as a major problem hampering the growth of e-commerce in conjunction of key concern of Internet users. Top reason why nonusers still avoid the Internet is some users prefer stricter forms of privacy such as anonymity to the Internet. Is it ethically right to allow users to use the Internet with a fake or an anonymous identity? While it caters to the privacy needs of some users, it may endanger the Internet usage for the others. Many users complain of being stalked by the anonymous users.

The freedom of expression endowed by social networking, has resulted in some Internet users publicizing wrong or undesired information under false names. They are free to discuss and opine about any and all topics in forums, chat rooms, communities and blogs. Moreover, such expressions do not require the users to disclose their identities. This raises issues in research ethics pertaining to the privacy of research subjects and informed consent. This is an undue advantage of the Internet privacy whereby the border between the private and the public spaces is made blurred. While providing open platforms for discussions, the Internet is ironically becoming a stage where fake people can voice false opinions and foster fallacies.

Reasonable limits must be set as information and communication technologies must be developed to protect privacy, rather than diminish it. In historical perspective on the right to privacy had been stated in Fourth Amendment (1789) which reasonable expectation of privacy protection against unreasonable searches and seizure.

In conjunction of privacy there are also provide some definition which is “The right to be left alone—the most comprehensive of rights, and the right most valued by a free people” and “The right of individuals to control the collection and use of information about themselves” There four aspect of legal concept of the right to privacy. Firstly, is protection from unreasonable intrusion upon one’s isolation? Next, is protection from appropriation of one’s name? Furthermore, protection from unreasonable publicity given to one’s private life. Lastly, is protection from publicity that unreasonably places one in a false light before the etc?

The trade-off would be to define the demarcating line between what's public and what's private. Internet privacy is indeed important in case of the revelation of personally identifiable information but it requires to be delimited in cases where privacy puts the Internet ethics on stake. His trade-off would be to define the demarcating line between what's public and what's private. Internet privacy is indeed important in case of the revelation of personally identifiable information but it requires to be delimited in cases where privacy puts the Internet ethics on stake.

According to McKinsey Global Institute, November 2002, there are improvements of lifestyle and standard of living due to the legal and ethical implication of Information Technology and Internet. It is stated that standard of living in the United States (U.S.) and Western countries has improved for a long time and the rate of change varies as the result of business cycles.

Within U.S., the labour productivity growth has averaged roughly 2 percent per year for the past century and the living standards doubled about every 36 years. (Ethics in Information Technology, Second Edition)

It is proven that the key factor in the productivity improvement is the innovation of technology itself and Information Technology and Internet carry great impact on the society lifestyle. (Whatever Happened to the New Economy? November 2002)




Table above shows the relationship of labour productivity rates and the investment in information technology within certain periods of years. The higher the labour productivity rates indicated that the involvement of innovation of technology was higher compared to the other years.

Based on “Whatever Happened to the New Economy?” the relationship between investment in information technology and U. S. productivity growth is complex due to the innovations of IT, people and money. In early time, the introduction of technology; computers, Internet and many more had driven the labour productivity rates to increase and the technology keep on changing from time to time. People are still influenced by the importance of having new technology to help and improve their daily life activities. More people with better knowledge bring new innovations which leads to new technology hence it will affect the labour productivity rates.

Besides that, the additional factors that can also affect national productivity rates are the business cycle, flexibility of labour market, outsource and offshore outsource and market share. (Ethics in Information Technology, Second Edition)

The level of comfort in lifestyle is measured by the intangible benefits through IT and internet by goods, services, luxuries and the availability of technology that certain people received.

Digital divide refers to the gulf between people who do and do not have access to information and communication technology. It exists mostly in less develop nations where 20 million people do not have the access to information and communication technology whereas 1 billion Internet users worldwide have.

The legal and ethical implication of Information Technology and internet to work can be a lot of things to be considered, such as plagiarism, boarders between workers, how to make an ethical environment to the workers. Ethical environment is important to any organization in order to have more efficient workers. According to Nickels (2010), “Ethics is a fundamental business term because it can and does apply to all workplaces. Regardless of the organizational function, employees who fail to maintain an ethical standard in their workplace can raise the possibility of not only organizational corruption but also legal liabilities”. Also according to Sporleder(2009),In an organization, workplace behaviour ethics should be a core value. Aside from doing the right thing, conducting ourselves ethically has great rewards and returns. Being ethical is essential to fixing problems and improving processes. It is needed to establish baseline measures and increase efficiencies”.
Plagiarism is a part of problem that always happened in the organization. Plagiarism is define as the imitation of another people’s work, thought, ideas, or expression and present it as one of their own original work. According to Jones (2006), Plagiarism in work can be more annoying because of people can take others ideas which mean the assets to them as use it as their own without shame. “Just like cockroaches,” they come again to plagiarise other people’s idea. Plagiarism can be serious offence to the victim because of taking their credibility in order to gain self profit.
Internet can be other source for some workers to use it to plagiarise other people works. So it is up to the organization to change their workers become to ethical workers before the workers can bring some problem and offence to the others. Which can make loses to the organization.

Wealth is the abundance of valuable resources or material possessions. The word wealth is derived from the old English wela, which is from anIndo-European word stem.An individual, community, region or country that possesses an abundance of such possessions or resources is known as wealthy.

The concept of wealth is of significance in all areas of economics, especially development economics, yet the meaning of wealth is context-dependent and there is no universally agreed upon definition. Generally, economists define wealth as "anything of value" which captures both the subjective nature of the idea and the idea that it is not a fixed or static concept. Various definitions and concepts of wealth have been asserted by various individuals and in different contexts.Defining wealth can be a normative process with various ethical implications, since often wealth maximization is seen as a goal or is thought to be a normative principle of its own.

If the chance of success and money is opportune to a wealthy person, their capacity and willingness can give rise to alleging various legal justifications for breach. A few years of legal expenses may only be a small proportion of their empire, and the resulting attrition and disparate investment in the conflict may eventually encourage other parties to renegotiate the disputed clauses.

In terms of moral relativism, most people would agree that it is ethically wrong to use wealth to control a situation and to ‘force’ people into renegotiating clauses in contracts if they are unable to afford the legal bill accompanying a dispute. However, as moral relativism is subject to a one’s own beliefs on what is right and wrong, some may not view using wealth as a means to control as being the wrong thing to do. In situations such as these, the ‘little man’ usually loses out and will ultimately succumb to the power of the other party or parties.

Computer-based information and communication technologies continue to change the delivery of health care and the conception and scientific understanding of the human body and the diseases that badly affect it. In fact, modern medicine has become almost impossible without the use of computers. While information technology has the potential to improve the quality and efficiency of patient care, it also raises important ethical and social issues. Work on ethical issues at the intersection of medicine and computing has so far generated an ensemble of interesting and important questions.

For examples, what are appropriate uses of health information systems? , who should use these systems? , what benefits and risks do these technologies have for patients? , how does information technology change the physician-patient relationship? , how does (and will) medical decision making change?

Medical informatics has developed as rapidly as any science in history, paralleling and relying on extraordinary advances in information collection, storage, analysis and transmission. Medical informatics is changing the standard of care. It is no longer to consider whether it might be responsible for a physician or a united health professional to fail to use intelligent machines or their accessories in clinical practice and research.

One should be forgiven for thinking that the science is progressing faster than the ethics.  People are too soon able to do things before they know whether they ought to or not. This is not a problem. It is rather a stage-setting in which they have the opportunity to use the tools of applied and theoretical ethics to track scientific change and, eventually, to guide it. If ethics lags too far behind, however, a science without moral underpinning risks losing touch with broadly shared human values. When use of a new machine poses risks to patients; and when failure to use the machine also may mean that a patient’s care might be sub -optimal, or that a patient might come to grief. Ethical analysis of these concerns and tensions thus emerges as a moral imperative itself. Put differently, failure to analyse the expanding application of an evolving technology is itself culpable.

It follows that ongoing developments in the fields of information and (tele-)communication technology require continuous monitoring of ethical and social implications. The Impact of IT on Healthcare Costs which are Healthcare costs is soaring out of control. The companies in the world are shifting costs to employees and eliminating healthcare coverage altogether for retirees. The causes for cost increases are use of more expensive technology and shielding of patients from true cost of medical care. Besides, development and use of new medical technology “accounts for one-half to two-thirds of the increase in healthcare spending in excess of general inflation.” To gain control over soaring healthcare costs by improving patient awareness and technology costs. Uses of IT industries Use of IT in healthcare industry includes Electronic health records (EHRs), Wireless technology, Telemedicine, Web-based health information

Reference:
Nickels, D.(2010). Workplace Behavior Ethics.
Retrieved October 30, 2011 from http://blogs.payscale.com/compensation/2010/04/workplace-behavior-ethics.html

Sporleder, J.(2009). Ethics in Workplace.
Retrieved October 30, 2011 from http://blogs.payscale.com/compensation/2009/12/ethics-in-the-workplace.html

Jones, D. (2006). Authorship gets lost on Web.
Retrieved October 30, 2011 from http://www.usatoday.com/tech/news/2006-07-31-net-plagiarism_x.htm

Marckmann G. (2001). Recommendations for the Ethical Development and Use of Medical Decision Support Systems.
Retrieved October 30, 2011 from http://www.i-r-i-e.net/inhalt/005/Marckmann-Goodman.p

Goodman KW (Hg.) (1998). Ethics, computing, and medicine. Informatics and the transformation of health care.
Retrieved October 30, 2011 from http://www.i-r-i-e.net/inhalt/005/Marckmann-Goodman.pdf




Wednesday, 12 October 2011

12 October 2011



Describe and explain the legal and ethical implication of Information Technology and internet to Intellectual property, privacy, lifestyle, work, wealth and health. 


Intellectual property - Hidayah
Privacy -  Nisa
Lifestyle - Amoi
Work -  Khairi 
Wealth - Fariza
Health - Syira




***************************************************************


Week 4 Activity 


Cultural Relativism - Amoi
Divine Command Theory - Fariza
Kantianism - Khairi
Act Utilitarianism - Hidayah
Rule Utilitarianism - Syira
Social Contract Theory - Nisa


SUBMIT ---> WEEK 5

Monday, 10 October 2011

Group's Member




1)  Muhammad Nur Hafiz bin Abdul Shukor    IS083342


2)  Nurul Fariza Binti Mohd Salim             GM084165


3)  Syahierah Ashikin Binti Baharuddin     GM084291


4)  Nurul Hidayah Binti Yahya                   GM084611


5) Siti Khairunnissa Binti Arudin                GM083393


6)  Mohd Khairi Bin Mohd Zaki                   IS083813