Question: Read the following cases and provide your assessment using software engineering professional code of ethics. Identify the principles and suggest your findings (analysis) (case 1
Read the following cases and provide your assessment using software engineering professional code of ethics. Identify the principles and suggest your findings (analysis)
(case 1 is just a reference on how the answer should be) .
(This is an Ethics class).
Case #1
Jean, a statistical database programmer, is trying to write a large statistical program needed by her company. Programmers in this company are encouraged to write about their work and to publish their algorithms in professional journals. After months of tedious programming, Jean has found herself stuck on several parts of the program. Her manager not recognizing the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Jean remembers that a coworker had given her source listings from his current work and from an early version of a commercial software package developed at another company. On studying these programs, she sees two areas of code which could be directly incorporated into her own program. She uses segments of code from both her coworker and the commercial software, but does not tell anyone or mention it in the documentation. She completes the project and turns it in a day ahead of time.
Theory : Kantianism 2nd formulation
Means: Coworker and company codes without notification
Ends: submitting on time, getting manager satisfaction
She used the coworker codes as a means to an end, according to Kantianism 2nd formulation, what she did is unethical.
Theory : Kantianism 1st formulation:
Rule: anyone can use other codes/ including commercial codes without notification.
No manager will aasssign task, or provide bonus to programmers because he know that the code I s not genuine.
Conclusion: its unethical
Case #2
Three years ago Diane started her own consulting business. She has been so successful that she now has several people working for her and has many clients. Their consulting work included advising on how to network microcomputers, designing database management systems, and advising about security.
Presently she is designing a database management system for the personnel office of a medium-sized company. Diane has involved the client in the design process, informing the CEO, the directory of computing, and the director of personnel about the progress of the system. Diane has described several options to the client. Because the system is going to cost more than they panned, the client has decided to opt for a less secure system. She believes the information they will be storing is extremely sensitive. It will include performance evaluations, medical records for filing insurance claims, salaries, and so forth. With weak security, employees working on microcomputers may be able to figure out ways to get access to this data, not to mention the possibilities for on-line access from hackers. Diane feels strongly that the system should be much more secure. She has tried to explain the risks, but the CEO, director of computing and director of personnel all agree that less security will do. What should she do? Should she refuse to build the system as they request?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
