School of Engineering
and Applied Science Department of Computer Science CSci 1030 -- Technology and Society http://www.seas.gwu.edu/~mfeldman/csci1030/summer16 Prof. Michael B. Feldman, course instructor mfeldman@gwu.edu |
(1000-2000-word paper, 8 point
contribution to your grade, Word document submitted via
Blackboard Assignments menu by Thursday, 5/26, 11:59 PM EDT)
Please use this standard file naming rule: Suppose your name is Jane Smith: call your file smith-jane-ethics.doc (or .docx).
Purpose:
An important purpose of this course is enable you to develop
analysis skills to make decisions on ethical issues that may
arise related to computer systems that you develop and implement
in the future. An effective way to do that is to analyze
hypothetical situations or scenarios that present ethical
dilemma based upon several criteria. Now that you've had a class
discussion on ethics scenarios, you'll do one on your own.
Assignment:
In this assignment you choose one of the scenarios below, and evaluate
it according to these four sections:
Assessment of your paper: Your paper will be graded based upon how well you can support your arguments with carefully stated reasons derived from the philosophical frameworks and the codes of ethics that were distributed to the class. You are expected to use correct English grammar and spelling.
Choose one of the following four scenarios to analyze:
Scenario
1 -- Conflicts of Interest?
Jim Adams, executive director of Housing Horizons, a nonprofit housing agency that had built and now managed 15 apartment complexes for low and moderate income residences in the area, was preparing for the organization’s bi-monthly board meeting. He was uncertain how to handle two of his board members and their requests. One, a local business owner, had asked Jim for the chance to bid on the electrical contract for the next complex to be built by Housing Horizons. The other, a local church leader, had heard about the first’s interest, and urged Jack to press for a policy that no member of the board could have a business relationship of any kind with the organization.
As Jim thought through the dilemma, he realized that the other major electrical contractor in town had not survived the housing bust and was now out of business. There were smaller firms but he was not sure any of them had done a project as large as this. Secondly, he realized the husband of one of the other board members owned a large office supply store where Housing Horizons bought all of its supplies, and the son of yet another was an executive with the maintenance company that serviced Housing Horizons’ properties.
Where should Housing Horizons draw the
line in contracting with board members and their families?
(adapted from a scenario at Santa Clara University, http://www.scu.edu/ethics/)
Scenario
2 -- Privacy:
A software engineer has started her own consulting business. She has been so successful that she now has 10 people working for her and a number of excellent clients. Their consulting work included advising on how to put together networks, how to design database management systems, and how to provide network security. Presently she is designing a database system for the personnel office of a medium-sized company. She has involved the client in the design process, informing the CEO, the director of IT (Information Technology), and the director of personnel about the progress of the system. It is now time to make decisions about the kind and extent of the security to build in to the system. She has described several options to the client. Because the system is going to cost more than they planned, the client has decided to opt for a less secure system. The software engineer believes that the data they will be storing is extremely sensitive personnel information, such as performance evaluations, salary data, medical records for insurance filings, and so on. With weak security, it may be possible for company employees to gain access to this data as well as for hackers to break into it. She feels strongly that the system should be much more secure. She tries to explain the risks, but the CEO and his staff all agree that the less expensive, less secure solution will be fine. What should she do? (From Communications of the ACM, February, 1993)
Scenario
3 -- Intellectual Property:
A programmer, working on a
sophisticated data mining package, is trying to write an
algorithm to do intelligent searches across multiple databases.
Programmers in this company are encouraged to write about their
work and publish their algorithms in professional journals.
After months of tedious programming, the programmer finds
himself stuck on one part of the problem. You, the division
manager, not realizing the complexity of the problem, want the
job completed within the next few days. The programmer remembers
that a co-worker had written an article about a similar problem
and given him the source code from an earlier version of a
commercial software package developed by another company. On
looking at those programs, he sees two areas of code that could
be incorporated into his program. He incorporates the segments
of code from the co-worker's article and from the commercial
package into the program, but does not tell anyone or mention it
in the documentation. The program works perfectly and is
delivered a day ahead of schedule. You receive an anonymous tip
about his actions from someone outside your company. What should
you do?
Scenario
4 -- Competition:
You are in a head-to-head battle with
your arch competitor, Evil Enterprises. One of your co-workers
approaches you. He has recently joined your company after having
worked for a second competitor for several years. He suggests,
"I made notes on all of Evil's bids when I could get the data.
They use some clear cost standards. Would you like me to bring
my notes to the office tomorrow and let you look through them?"
How do you respond? (From Santa Clara University, http://www.scu.edu/ethics)
[end]