SP-101-Lesson-1-2-3
SP-101-Lesson-1-2-3
ETHICS – also called moral philosophy, the discipline concerned with what is morally good
and bad and morally right and wrong. It is a set of beliefs about right and wrong behavior
within the society.
Ethics is a code of behavior that is defined by the group to which an individual belongs.
Ethics help members of a group understand their roles and responsibilities so they can work
together to achieve mutual benefits such as security, access to resources, and the pursuit of
life goals.
Its subject consists of fundamental issues of practical decision making and its major concern
include the nature of ultimate values and standards by which human actions can be judges
of right or wrong (Encyclopedia Britannica)
Ethical behavior conforms to generally accepted norms – many of which are almost
universal. However, although nearly everyone would agree that certain behaviors – such as
lying and cheating are unethical.
For example:
Attitude towards software piracy – a form of copyright infringement that involves making
copies of software or enabling others to access software to which they are not entitled -
range from string opposition to acceptance of the practice
Your moral principles are statements of what you believe to be rules of right conduct. As a
child, you may have been taught not to lie, cheat or steal. As an adult, facing more complex
decision, you often reflect on your principles when you conduct what to do in different
situations.
Morals are one’s personal belief about right and wrong, while the term ethics describes
standards or code of behavior expect of an individual by a group to which an individual
belongs.
The term morality refers to social conventions about right and wrong that are so widely
shared that they become the basis of an established consensus. However, individual views
of what behavior is moral vary by age, cultural groups, ethnic background, religion, life
experiences.
A virtue is a habit that inclines people to do what is acceptable, and a vice is a habit of
unacceptable behavior. Fairness, generosity, and loyalty are examples of virtues, while
vanity, greed, envy, and anger are considered vices. People’s virtues and vices help define
their personal value system - the complex scheme of moral values by which they live.
Life is complex, and or occasion, you will encounter a situation in which the ethics of the
group to which you belong are in conflict with your morals.
A person who acts with integrity acts in accordance with a personal code of principles. One
approach to acting with integrity is to extend all people the same respect and consideration
that you expect to receive from them. Unfortunately, consistently can be difficult to achieve,
particularly when you are in situation that conflicts with your moral standards.
Law is a set of rules that tells us what we can and cannot do. Laws are enforced by a set of
institutions (the police, courts, law-making bodies). Legal act are acts that conform to the
law.
Morals acts conforms to what an individual believes to be the right thing to do. Laws can
proclaim an act as legal, although many people may consider the act immoral.
➢ Ethics has risen to the top of the business agenda because of the risk associated with
inappropriate behavior have increased, both in their likelihood in their potential
negative impact.
- envy
- bullying
- stealing
➢ Several trends have increased the likelihood of unethical behavior. First, for many
organizations, greater globalization has created a much more complex work
environment that spans diverse cultures and societies, making it more difficult to apply
principles and codes of ethics.
➢ Corporate Social Responsibility (CSR) is the concept that an organization should act
ethically by taking responsibility for the impact of its actions on its stakeholders,
consumers, employees, community, and suppliers.
o benefit of employees
o insurance, benefits, bonus
➢ Supply Chain Sustainability takes into account such as fair labor practices, energy
and resources conservation, human rights, and community responsibility.
➢ Organizations have at least have good reasons to pursue CSR goals and promote a
work environment in which employees are encouraged to act ethically when making
business decisions.
a) Gain the goodwill of the community
o Value diversity
Dilemma:
The growth of the Internet and social networks; the ability to capture, store and analyze vast
amounts of personal data and a greater reliance in information systems in all aspects of life
have increased the risk information technology will be used unethically.
Here are some examples that raise public concern about the ethical use of information
technology
- Governments around the world have implemented various systems that enable the
surveillance of their citizens and are struggling to achieve the proper balance
between privacy and security.
- Many employees have their email and internet access monitored while at work, as
employees struggle to balance their need to manage important company assets and
work time with employee’s desire for privacy and self-direction.
- Millions of people have downloaded music and movies at no charge and in apparent
violation of copyright laws at tremendous expense to the owners of those copyright.
- Organizations contact millions of people worldwide through unsolicited email and text
messages in an extremely low cost, but intrusive marketing approach.
- Hackers break into databases of financial and retail institutions to steal customers
information and then use it to commit identity theft – opening new accounts and
charging purchases to unsuspecting victims.
- Students around the world have been caught downloading material from the web
and plagiarizing content for their term paper.
- Websites plant cookies or spyware on visitors hard drives to track their online purchases
and activities.
- Protection of Privacy:
Safeguarding user data and personal information.
- Cybersecurity:
Ensuring systems are secure to prevent breaches and data theft.
- Social Responsibility
Minimizing negative impacts technology on society.
Effect of IT on individuals
- Privacy Concerns:
Monitoring and data collection challenges.
- Digital Divide:
Unequal access to technology and its benefits.
- Online Behavior:
Cyberbullying, harassment, and digital etiquette
- Increased Efficiency:
Automation and streamline processes
- Data Management:
Collecting and analyzing information for strategic decisions.
- Employment Changes:
Adaptation to technologies advancements and potential job displacement.
- Ethical Dilemmas:
AI ethics, automation ethics, and technological biases.
- Environmental Concerns:
E-waste and energy consumption.
Lesson 2: ETHICAL THEORIES AND DECISION-MAKING MODELS
- Ethical theories provide frameworks for making decisions about what is morally right
or wrong. They help individuals and societies determine how to act in various
situations.
- This often involves the process of judgement. An ethical theory should provide
guidance, by pointing the way on questions where we don’t have clear rules already
➢ RELATIVISM THEORY
- Relativism is the belief that moral principles are not absolute but are relative to the
perspective or cultures from which they arise.
- It is the theory that there is no universal moral norm of right and wrong. According to
this theory, different individuals or group of people can have completely opposite
views or moral problem, and both can be right. It can suggest that different
environment spawn different ethics.
Imagine two friends discussing the morality of eating meat. One friend believes eating
meat is morally acceptable because it’s a personal choice and thy enjoy it. The other
friend believes its morally wrong due to the arm it causes to animals.
2. Cultural Relativism posits that morality is determined by cultural norms and practices.
What is considered right or wrong varies from culture to culture, and no culture’s ethics
are superior to another’s. It is the ethical theory that the meaning of “right” and
“wrong” rest with a society’s actual moral guidelines. These guidelines vary widely
from place to place and from time to time. Ethical behavior normally adapts to
generally accepted norms.
In some cultures, arranged marriages are common and respected practice. In other
cultures, individuals typically choose their own partners. Cultural relativism would
argue that neither practice is inherently right or wrong; rather each is valid moral
choice within cultural context. Judging one practice as superior to the other would
be seen as ethnocentric.
- Divine Command Theory holds that morality is determined by the commands of the
divine being, often associated with religious teachings. According to this theory,
actions are morally right if they align with the will of God (gods) and wrong if they do
not.
- This theory emphasizes obedience to religious doctrines but it is often criticized for its
reliance on faith and the challenges if interpreting divine commands across different
religions.
- Fundamentalist are more likely to consider Holy Book authentic and authoritative.
Most sects within these religious traditions augment Holy Books with other sources
when developing their moral codes.
- The divine command theory is based on obedience, not reason. If good means
“willed by God”, and if religious text contains everything, we need to know about
what God wills, then there is room left for collecting and analyzing facts.
A person follows the teaching of their religion, which commands them to give a
portion of their income to charity. They do this not because they believe it will benefit
them in any worldly way, but because their religious beliefs tell them that is what God
commands, making it the morally right thing to do. According to Divine Command
Theory, the morality of their actions.
➢ ETHICAL EGOISM
- Ethical egoism is the belief that individuals should act in their own self-interest.
According to this theory, the moral actions is the one that maximizes one’s own
benefit.
- Ethical egoism contradicts with altruism which prioritizes the welfare of others. Critics
argue that ethical egoism can lead to conflicts of interest and disregard for the well-
being of others.
- Ethical egoism does not prohibit acting to help someone else, but assisting another is
the right thing to do if and only if it is the helper’s own long-term best interest.
Can you think of acts which will not benefit the doer? You may say:
- If there is only one bread for a mother and her child, the mother deprive herself of the
bread and allows her child to consume the bread;
- the father will always work overtime just to provide the needs of his family.
- One of the siblings may volunteer to stop studying so that his other siblings may
continue studying because their parents cannot afford to send them to school
simultaneously.
A business decides to lower the wages of their employees to increase their own profits.
The owner believes that their primary moral obligation is to maximize their own wealth,
even if it means harming others. This decision reflects ethical egoism, were the morally
right action is the one that serves the individual’s self-interest.
➢ CONSEQUENTIALISM
- Consequentialism is the ethical theory that judges the morality of an action based on
its outcomes or consequences.
- The core idea is that the rightness or wrongness of an action depends on the effects
it produces.
- If an action leads to good outcomes, it is considered morally right, it it leads to bad
outcomes, it is wrong.
- Act Utilitarianism:
Evaluates each action individually based on consequences.
- Rule Utilitarianism:
Focuses on following rules that generally lead to the greatest good.
➢ KANTIANISM/DEONTOLOGY
- According to Kant, actions are morally right of they are performed with sense of duty
and adhere to universal moral laws, known as categorical imperatives.
- According to Kant, morality is based on pure reason. As people have innate ability to
act rationally. They, therefore must act morally, irrespective to personal desires.
Another way of stating Kant’s theory is “Act morally regardless of the consequences.”
Lesson 3: ETHICS FOR IT PROFESSIONALS AND WORKERS
➢ IT PROFESSIONALS
➢ ICT or IT CAREERS
o ANALYST PROGRAMMER
▪ write, test, design, and develop computer software and programs.
o AV TECHNICIAN
▪ provide technical support for the production, recording and
broadcasting of media.
o BUSINESS ANALYST
▪ evaluate and develop technology systems to help business run at
optimal standard.
o IT MANAGER
▪ organize and run IT departments in companies and organizations.
o IT SALES PROFESSIONALS
▪ facilitate selling hardware, software and other information and
communications technology.
o IT SECURITY SPECIALIST
▪ develop and maintain secure database management systems for
organizations.
o IT TRAINER
▪ plan and conduct IT training programs, and write user manuals for
clients.
o NETWORK PROFESSIONAL
▪ organize and run IT departments in companies and organizations.
o PROGRAMMER
▪ create and edit programs by converting the requirements of a project
into code.
o SYSTEM ANALYST
▪ plan, implement, modify or coordinate data and information systems, to
meet business needs.
o TELECOMMUNICATIONS TECHNICIAN
▪ ensures that communication equipment is installed and maintained
properly.
o TEST ANALYST
▪ offer support and testing to create and maintain functional systems
based on technology.
o WEB DEVELOPER
▪ specialize in website development including design, structure, and
layout.
➢ SOFTWARE PIRACY
Sometimes IT users are the ones who commit software piracy. Some IT end users have figured
out how to download applications from the Android Market Web site without paying for
them, and then use the software or sell it to others.
Example:
A common violation occurs when employees copy software form their work computes for
use at home. When confronted, the IT user’s argument might be: “I bought a home computer
partly so I could take work home and be more productive; therefore, I need the same
software on my home computer as I have at work,” However, if no one has paid for an
additional license to use the software on the home computer, this is still piracy. The increasing
popularity of the Android smartphone operating system has created a serious software
piracy problem.
Some employees use their computers to surf popular Web sites that have nothing to do with
their jobs, participate in chat rooms, view pornographic sites, and play computer games.
These activities eat away at worker productivity and waste time.
Furthermore, activities such as viewing sexually explicit material, sharing lewd jokes, and
sending hate email could lead to lawsuits and allegations that a company allowed a work
environment conducive to racial or sexual harassment
Every organization stores vast amounts of information that can be classified as either private
or confidential.
For example:
Their salary information, attendance data, health records, and performance ratings.
Confidential information describes a company and its operations, including sales and
promotion plans, staffing projections, manufacturing processes, product formulas, tactical
and strategic plans, and research and development.
An IT user who shares this information with an unauthorized party, even inadvertently, has
violated someone’s privacy or created the potential that company information could fall
into the hands of competitors.
Why is it important?
- Adherence to the code means that professionals follow common set of values and
belief as guide for making satisfactory decisions.
- Adherence to the code reminds professionals of their responsibilities and duties that
they might compromise.
- Adherence to the code promotes integrity and good judgement as it enhances trust
and respect among professionals.
- Evaluation Benchmark
PREAMBLE:
I will use my special knowledge and skills for the benefit of the public. I will serve employers
and clients with integrity, subject to an overriding responsibility to the public interest, and I
will strive to enhance the competence and prestige of the professional. By these, I mean:
- I will consider the general welfare and public good in the performance of my work.
- I will comply and strictly abide by the Intellectual property laws, patent laws, and other
related laws, in respect of Information Technology.
- I will accept full responsibility for the work undertaken and will utilize my skills with
competence and professionalism.
- I will not disclose or use any confidential information obtained in the course of
professional duties without the consent of the parties concerned, except when
required by law.
- I will try to attain the highest quality in both the products and services, I offer.
- I will uphold and improve the IT professional standards through continuing professional
development in order to enhance the IT profession.
Bring together computing educators, researchers, and professional to inspire dialogue, share
resources, and address to field’s challenges.
As the world’s target computing society, ACM strengthens the profession’s collection voice
through strong leadership, promotion of the highest standards, and recognition of technical
excellence.
ACM supports the professional growth of its members by providing opportunities for life-long
learning, career development, and professional networking.
Founded at the dawn of the computer age, ACM’s reach extends to every part of the globe,
with more than half of nearly 100,000 members residing outside the U.S.
Their actions enhances ACM’s ability to raise awareness of computing’s important technical,
educational, and social issues around the world.
The ACM Code of Ethics identifies the elements of every member’s commitment to ethical
professional conduct.
It outlines the fundamental considerations that contribute society and human well-being and
those that specifically relate to professional responsibilities, organizational imperatives and
compliance with the code.
2. Professional Responsibilities
2.1. Strive to achieve high quality to both the processes and products of professional
work.
2.5. Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risks.
2.9. Design and implement systems that are robustly and usably secure.
3. Professional Leadership Principles
3.1. Ensure that the public good is the central concern during all professional
computing work.
3.3. Manage personnel and resources to enhance the quality of working life.
3.4. Articulate, apply, and support policies and processes that respect the principles
of the code.
3.7. Recognize and take special care of the systems that become integrated into
the infrastructure of society.
4.2. Treat violations of the code as inconsistent with membership in the ACM.