Software Engineering Ethics
Keywords:ethics, principles of software engineering ethics
Over the past 30 years, computer engineering has developed a lot. Currently, computer and software applications have a central role in business, medicine, security, communications, industry, education, and everyday life. Software developers, peoples who manage computer networks, data security analysts can do well, but they also have the potential to cause suffering and harm to the clients or ordinary peoples, willingly or not. For this reason, IT activities must be regulated by specific laws. From the beginning, we argue that the law is not the same thing as ethics, even if both promote the good. Certain ethical principles can be strengthened by law. In the field of computer science and technology, can exists theft, privacy violations, violence and harassment. To combat and punish such actions and behaviors, law is needed. But is software engineering a profession? If so, are there codes of professional ethics whereby specialists in the field can regulate their professional activity, as is the case, for example, in areas such as justice or medicine? In relation with that, Gibbs and Ford have identified 8 components of a professional infrastructure. Some of that is: initial vocational training, professional accreditation, licensing, continuous vocational training, the existence of code of ethics. (Ford & Gibbs, 1996). With the fact that software engineering is a profession, in this article we present the main principles of behavior. The principles are not legally binding. This are grouped by interest categories depending on who or what is involved in the interaction with software engineering.
Association for Computing Machinery (ACM). (1992). Ethics, The Official Site of the Association for Computing Machinery's Committee on Professional Ethics. http://ethics.acm.org/code-of-ethics/previous-versions/1992-acm
Association for Computing Machinery (ACM). (2018). ACM Code of Ethics and Professional Conduct. https://www.acm.org/binaries/content/assets/
Floridi, L. (2008). Information ethics: Its nature and scope. In J. Van den Hoven & J. Weckert (Eds), Information technology and moral philosophy. Cambridge Studies in Philosophy and Public Policy (pp. 40-65). Cambridge University Press.
Ford, G., & Gibbs, N. (1996). A mature profession of software engineering. Technical report. Carnegie-Mellon University. https://resources.sei.cmu.
Harris, C. E., Pritchard, M. S., & Rabins, M. J. (2009). Engineering ethics: Concepts and cases (4th ed). Cengage Learning.
Marcu, D., Danubianu, M., & Pentiuc, G. (2019). Big data technology - Valuable tool for healthcare research. International Journal of Computer Science and Network Security, 19(4), 116-122. http://paper.ijcsns.org/07_book/
Merriam-Webster. (n.d.). Profession. https://www.merriam-webster.com/dictionary/
Quinn, M. J. (2009). Ethics for the information age (3th ed.). Pearson Education.
Quinn, M. J. (2015). Ethics for the Information age (6th ed.). Pearson Education.
Sills, D. L. (Ed.). (1968). International encyclopedia of the social sciences. Macmillan Company and The Free Press.
Vacura, M. (2015). The history of computer ethics and its future challenges. Information technology and society interaction and interdependence. Proceedings of 23rd Interdisciplinary Information Management Talks (IDIMT 2015) (pp. 325-333). Trauner Verlag Universitat.
How to Cite
Copyright (c) 2020 The Authors & LUMEN Publishing House
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant this journal right of first publication, with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work, with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g. post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g. in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as an earlier and greater citation of published work (See The Effect of Open Access).
Postmodern Openings Journal has an Attribution-NonCommercial-NoDerivs