Assignment #1 Midterm
CASE SCENARIO #1 Sean is a programmer in ABC software solutions. As a senior programmer he was tasked to develop a Customized Hiring Program that will accept employer based on their classification. Sean is a graduate of FAG University, a leading IT university in the Philippines. His program filter data from applicant’s credential database. He guaranteed to his batch mates that they will be prioritize to the company where his system is deployed. Question: Using the ACM Code Article 1.1 What did Sean violated? Sean violated the Respect diversity of all cultures because it is not good that you prioritize your service for the person whom you are close, known, etc. It’s right to serve with equal or fair prioritization for every clients/customers, because it helps to gain more good reputation and can bring more clients/customer. How did his program contributed to the society and human well – being? The Customized Hiring Program that Sean developed contributed to the society and human well –being, by giving Sean’s company a chance to determine precisely whose employer are really fit into the specific type of job by their classification. This question applied the ‘Quality of life’. What are the potential damage to the local and global environment that Sean commit? Potential damage such as discrimination will be applied to this kind of case. We must respect every culture of every different group of people. CASE SCENARIO #2 One of the requirements given to the CSIT students at University of Perpetual Help is to create a research which will be part as the technological research of the University. Simeon and Fred created a proposal that will automatically detect and segregate non – biodegradable and biodegradable materials. It also have an automatic counter that will enable garbage collector how many of each class has been collected for a day. This was implemented and being used in university. Its revenue was given to the University Cooperative where employee can loan based on their salary scheme. Little did the management known that this was created with the help of paid professional helped outside. Question: Is there a violation to the work of Sean and Fred? Sean and Fred did a violation in which they don’t acknowledge these professional in helping to finish their technological research project. In what ways can we be a socially responsible in creating or developing programs? We must include in developing a program any information that includes the information of end-users, information how the software will run and be use without violating any ethical laws. Always gather surveys and ask a help to the professionals and expert. CASE SCENARIO #3: Samuel works on a software development firms that offers science and technological innovation throughout the country. They can do both hardware and software solution. One day Samuel was called by their administrative official to create a program for a chemical laboratory. Samuel created and design the said program based on the concepts and objectives given by the Chemical Laboratory. To fully implement the system, Samuel needed to survey the facility to where server will be placed and how it will be connected properly to the workstations. In his survey he found out that there are some hazardous medicinal plant store in the company laboratory. This medicinal plant was also incorporated in the medicine manufactured by the company. Samuel thinks that the project he is doing with the company can be used to separate illegal drug to the medicine that the company produces or might be used to incorporate those drugs in their product. Samuel did not finish his contract and left his company and lives outside the country. QUESTION: Did Samuel violated Article 1.2 of ACM Code of Ethics? Yes, by leaving his company without finishing his contracts he violated the Article 1.2 of ACM Code of Ethics, it affects the employer, or based on the case is the administrative official, it is also a loss of property, Samuel must leave his company in a desirable/right way. Is Samuel action causes harm to: Employer – yes, it is a loss of property, he started the projects but don’t finish it. Co – employees – It depends, if Samuel work as a team, not only himself in doing his projects, then also his co-workers might get affected by loss of their team Samuel. General public – It depends, if the project is already been showed out in the public, and there is a given date when it will be published and implemented, then it can also affects the general public since there is a possibility that the project might not be continued to finish or to it will not implemented in the promised date/time. Users – no. CASE SCENARIO #4 Jean, a statistical database programmer, is trying to write a large statistical program needed by her company. Programmers in this company are encouraged to write about their work and to publish their algorithms in professional journals. After months of tedious programming, Jean has found herself stuck on several parts of the program. Her manager not recognizing the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Jean remembers that a coworker had given her source listings from his current work and from an early version of a commercial software package developed at another company. On studying these programs, she sees two areas of code which could be directly incorporated into her own program. She uses segments of code from both her coworker and the commercial software, but does not tell anyone or mention it in the documentation. She completes the project and turns it in a day ahead of time. QUESTION: To what extent that Jean violated Article 1.3? Because she did not acknowledge and don’t mentioning it on her developed software documentation these source listings, the codes, in where it came from, She is not just violated the article 1.3 of ACM Ethical Codes, she also pretend to be the one who claims as the owner of these source listings and segments of code she use in her program even though she just really steal it. What was wrong in Jean actions? She don’t respect the works of others, she steal information because she did not mention it on software documentation. CASE SCENARIO #5 Linda works on PCSO (Philippine Charity Sweeptakes Office), she is in charge of verifying the indigency of their client. In order to do this she needed to contact sss, bir, dswd agencies just to make sure that they are giving correct amount to correct client. Since she was graduate of accountancy and computer science, she created a verifier through the means of extracting data from sss and bir which will give her a hint, if the client is a taxpayer or not. It will also enable her to determine if the client is currently working and how much income their client receiving per month, through sss contribution scheme. The only thing that she do is to contact the dswd agency where client seeks assistance. With this kind of program, an automatic calculation of financial assistance will be given to the client. When her manager found out what she did, she then given a recognition and promoted as an IT Director in the PCSO. After few months of using the system, a new manager came. She wanted Linda to incorporate dswd agency where she belongs, and incorporate all the names of the PCSO employee to be exempted in the program that they are currently using. Aside from it, she was also asked to incorporate the director closed – friend to be exempted in the system. There will be certain percentage that Linda will get from whatever amount an employee and “close friend” get from PCSO. Commission of Linda will goes automatically to her bank account. QUESTION: In the given case, when discrimination took place? When the new manager asked Linda to incorporate her with the director closed-friend other than PCSO employee, it means that prioritizing the service of Linda for this director closed-friend. That is the time when discrimination took place. What is right and wrong in the given scenario? It is right that Linda and her PSCO co-employee will be exempted in the program that they are currently using, but including these director close-friend which Linda don’t even know if he/she were also a PCSO co-employee. If you are in the case of Linda, are you going to abide your manager? In the give scenario, it seems that the new manager are also close friend of the director, and if I don’t abide what the new manager wants, the director can also be mad at me and can fired me in my work. I say yes if I really love this job, I say no if my conscience is more at me. CASE SCENARIO #6 Popo works as a creative designer. He do a lot of commercials and indie films. His works begins with storyboarding where concepts came from the people he meet during and after the project. Per every page of Popo’s creative design, there is always a citation where prototype or segments are generated from. He kept it in a files and give to her secretary and it is properly kept in their hard drive and filing cabinet. He don’t won’t allow her colleagues to use his storyboarding without mentioning where segments came from. One of his friend finds Popo’s behavior as an odd one. For Popo, citation is necessary to give credit to the one who make it. CASE SCENARIO #7 Teacher Annie is a good teacher in their department. She works without complaining and do tasks given to her ahead of time. Most of the time she was asked to do things without pattern or template. Still, she works with no complaint at all. There are some times that Annie is complaining but still she do whatever tasks is given to her as long as it is part of her job as a coordinator and as a professor. After completing the needed documents in their department, Annie noticed that her contract as a coordinator was not renew anymore. Since their college is suffering for a loss of students again Annie did not complain nor asked his boss about the renewal of contract. After a year, Annie noticed that most of her works submitted to the department was given to her co-worker. Her co-worker enjoyed every papers and programs Annie’s worked without recognition or citation that she is the one created it. The worst of all, her works was published by her co –worker and she did not gain anything on it. QUESTION: What is wrong in the scenario? Case Scenario #6: There is no wrong with this case scenario. Case Scenario #7: Teacher Annie did not renew her contract at the right time and her boss did not say to so. Teacher Annie’s co-worker published all works of Teacher Annie as if the co-workers the one who originally created it and did not create any citation/recognition from works of Teacher Annie. What was the role of citation in documentation? It is to deliver an acknowledgement to the original author/source of information and to act as a researcher not an information stealer. Why do we need to cite references on every program or documents we are doing? Because if we do not cite the references, it just like that we are stealing or plagiarize the work or idea of others as if we’re the ones idea even though it’s not. If you will be the boss or immediate supervisor of Annie, are you going to do the same? Absolutely NO, I will remind her first to renew her contract and I will never use her work and ideas without asking her permission or if else, just referencing or citing her name that she is the original author of ideas and information that I will be used. CASE SCENARIO #8 AC works as a system administrator in ABC manufacturing firm. She is in charge of determining messages that comes in and out to their company’s website. She filtered the data that will go the employee’s inbox and only allow them to read unwanted messages during lunch break. As part of the job, AC thinks that it is better to read all the files or messages that should be delivered to the employees. With this kind of procedures, AC knows every detail of mail that is sends to their employees. Most of the time, AC accompanied messages with her personal messages stating what is the content of the mail. QUESTION: • What is privacy? Privacy means the quality of being secluded from the presence or view of others • What are the ways to have a protected data? There is so many ways, if you have confidential or personal information or documents you don’t want other to see or to be curious of, then if it is stored in your digital device such as computers, cellphones, etc. – better to protect its access with password. If it is kept in your house, then put in on cabinets/drawers with locked but other than above, the best solution is to keep the information in your mind. • Is AC action can be considered as a crime? Yes. It is a violation in the rights of privacy of others. AC must just depends in the email’s subject, it is not right to read every message of the email. • What was the role of subject in an e-mail? It role is to help or determine what the discussion of message is all about. Case Scenario #9 • Going back to Samuel’s case. Can we apply the rule of confidentiality to his research? Yes. After Samuel determined that that the project he is doing with the company can be used to separate illegal drug to the medicine that the company produces or might be used to incorporate those drugs in their product, he must propose it to his administrative officers before taking any action. • If you were AC’s, how can you used privacy and confidentiality in you’re kind of worked? I must not read the contents of the e-mail especially if I know that the email does not related to the company |
The post Sean is a programmer in ABC software solutions. appeared first on My Assignment Online.