Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING Research, Ethics, and Professionalism in Computing Name of the student: Name of the university: Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING Abstract The report has demonstrated various ethical issues like conflict of interests. It has been common for variousprofessions.Atengineeringandcomputing,thedistinctethicalchallengeshasbeen developed from creating of machines. There external behaviors has been e=resembling human behaviors that are regarded as intelligent. Since, the machines of current world has been more sophisticated and versatile, they have been rousingly taking the tasks that are assigned to humans. This also includes engineers and comparing experts which should rethink about their relationships for the artifacts that are deployed, developed and designed them. For this, the represent study is aimed to find out issues that related to ethics of computers regarding accessibility, property, accuracy and privacy. Further, the study aims to analyze the origins of those challenges. Besides, it has suggested problems with the help of practitioners with ICT background.
2RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING Table of Contents 1. Background:.......................................................................................................................................3 2. Research questions:...........................................................................................................................3 3. Literature review:...............................................................................................................................4 3.1. Past developments and history:..................................................................................................4 3.2. Present situation:.........................................................................................................................5 3.3. Ethical issues:.............................................................................................................................6 3.4 Identification of gaps in knowledge requiring to be addressed:..................................................6 4. Methodology Review:.......................................................................................................................7 4.1. Range of research approaches:...................................................................................................7 4.2. Methodology review:..................................................................................................................9 4.3. Selection:..................................................................................................................................10 5. Project Plan:.....................................................................................................................................11 6. Ethical Review Form:......................................................................................................................12 7. Consent Form:.................................................................................................................................14 8. Pilot study:.......................................................................................................................................14 9. Conclusion:......................................................................................................................................16 10.Appendix:......................................................................................................................................17 11.References:....................................................................................................................................19
3RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING 1. Background: The Ethical conduct of research has been an important cornerstone of current day scientific research. The area of computer science and various technological artifacts has been touching all aspects of current life. Hence, the researchers have needed to report and conduct research in an ethical way. Ethical review has not been just about preventing or making it difficult to conduct research. It has been about helping the researcher thing through various issues and the ways to relate them. Principles of good research practice encourage the individuals included in research. They also considered the wider consequence of the research. Further, it has been helpful to engage intellectual, ethical and practical challenges that are inherent to high quality research. The potential ethical dilemmas faced in this discipline are needed to be investigated. An analysis is also required on how ethical concerns have been addressed in those cases. Hence the research on professionalism and ethics in computing is chosen to look into future development as the code for ethical research on computer science. Ethics in computing has urged different kinds of scholars for revisiting technologies and its values. Moreover, though ethics in computer has been falling under the field related between the areas of science and ethics, it has been a unique and holistic type of disciplines. It provides principle to understand, conceptualize and use of computer technology. The following report has discussed various research questions on the above area. Then relevant literatures are reviewed that identifies various gaps. Next a critical review is done on various research methods and the available methods are discussed as per the research question. Lastly an in-depth project plan is demonstrated in this study.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING 2. Research questions: The various ethical implications of the researches should include the following. How to make deal with actual nature of computing for the service to other human beings? How to convey different senses of professional responsibilities? How to sensitize employees in business regarding computer ethics issues? How can one provide methods and tools to analyze cases? 3. Literature review: 3.1. Past developments and history: Improper use of information technology is the method to disturb property and privacy creating various ethical dilemmas. It has lead to ethical issues about the usage of technology. The term has been first used in mid 60s as the application for various fields of professional ethics. This was transformed and decreased with the help of the emergence of computers. As per the article by Iqbal and Beigh (2017)ethics in computing is defined as the complex and dynamic field involving values, policies, ideas and facts. This idea has not been considered as the entity of computer sociology and computer technology till 1990. Till present years a transformation is witnessed in understanding computer ethics leading to field to involve computer ethics, technological values, computer technology, computer sociology and ethics.Stahl (2014)showed that computing ethics has neither been the ethical principles to abide by or the technology that has been deprived of particular values as deploying those principles. In this way the computer ethics has been urging scholars in revisiting computer technologies. The computer has been a distinct and holistic approach that provides various principles to understand, conceptualize and the using computer technology.
5RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING 3.2. Present situation: In the current era computing is a fast developing field making that hard to predict what would be coming next. Apart from this, it has been clear that individuals and information society in the society has been moving on confronting radical societal and technological developments. This has lead to create latest patterns for behavior and then accommodate those developments as per as Bryman and Bell (2015). Under this situation, the shaping of those processes of behavior generation, idea of computing ethics is emphasized along with the idea of professional ethics. Besides, the idea of computing ethics has not been analyze currently under the framework ICT-related professional ethics. Instead this must be investigated under the framework of different personal ethics. This is also needed to be followed by different kinds of people of information society. At the present era,Weckert (2017)mentions that there have been rise in competition and development in the current information society that is been maintained through the ability of people for getting into information easily and fast. Further, the interpretation production and consumption of data has been carrying too much importance. In this regard, various access tools of information have possessed a vital place in the society of information. Here, the information technologies have not been influencing and transforming the ways in which people live. It has been ways in which rituals in the society is utilized. However,Gotterbarn et al. (2018) has showed thatthere have been many optimistsandpessimistspresent for thistransformation.Further,there havebeen the individuals who have believed that there has been a reverse type of relationship that has been existing between society and technology. It has lead to assumption that the technology has been sued for negative and positive purposes. Further, it has been clear that the technology has providing people and society with various advantages through serious ethical issues. At the present state, as
6RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING ignored, those accompanying issues have been interfering with different moral mechanisms and societal values. 3.3. Ethical issues: There have been four ethical issues identified in computing in the present age. They are accessibility, property, accuracy and privacy. Here, the growth of information technology has been the ability for control, different information processing, retrieval and storage and rise in value of various kinds of information under the decision-making. This has leaded the decision makers in acquiring personal information through invading that privacy. Further,Kanabar et al. (2016) mentioned thataccuracy has been highly related to various correctness of information. This has been delivered through ICTs. The data is used for mismanaging the life of people especially when the party using improper data possesses more authority and data. Here, the most complicated and confronted ethical issues are the query regarding intellectual property rights. Further, data has been quite expensive in producing the first instance. Reproduction and transmission of information has been problematic. This is because it has been able to invade the product rights claimedEke, Stahl and Fidler (2015). Lastly, the accessibility is also referred to here. This denotes the various conditions under which individuals or organization has possessed the privilege or right to retrieve information. The principles have constituted the starting point. Hence it has been needed to find out the principles and rules and create consensus under society. This is done through conducting investigations on the basis of those principles. 3.4 Identification of gaps in knowledge requiring to be addressed: The rise in number of social science and education researches has conducted and designed various online researches. There has been various policy gaps found in the researches like as done by McAuliffe and Nipperess (2017). This also included range of groups and stakeholders having the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING role or attempting to play the role to form better policies regarding ethics. There have been various complexities around applying human subject model for conducting internet research that has needed to be explored. This includes problems of privacy, informed consent and anonymity. Further, the discourse regarding computing ethics has comprised various resolutions that have needed approaches and ideas. There has been convergence of technologies taking place and various kinds of presently created fields of technology that have been intimately inter-linked to the field of computing.Tractenberget al. (2015) highlighted that, here the shift in focus towards information from computing has moved towards defining different kinds of boundaries of computer ethics. Thus it has not necessarily addressing the primary challenges of the unclear practical relevance. Further, the complaints regarding lack of relevance has not been confined under this type of ethics. The reason is that decision in IS on relationship to rigor versus relevance. Moreover,Blažun et al. (2017) highlighted thatit has been plausible in thinking that raising the ubiquitous nature of computing technologies. This has called for reflection of various inter-related ethical concerns under public discourse and various policies. This has been for a stronger presence of computer ethics. This take place under those public discussions that is needed to be desirable. 4. Methodology Review: 4.1. Range of research approaches: The various potential research areas for research, ethics, and professionalism in Computing are listed below. Graphics and Virtual Reality This includes alternative representations of different non-graphic information (Langendyk, Mason and Wang 2016). This also includes creation of nearly complete sensory environments that might exist in reality. This has been very
8RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING much human perception as those representations get manipulated and created is needed for human perception. KDDM or Knowledge Discovery and Data Mining Diverse and huge data sets are manipulated and examined due to extraction is hidden patterns and knowledge that has not be observable otherwise. It has been commonly using tireless and faster type of human surrogates. Here the potential hasbeenexistingforattackonpersonalprivacy.Further,thereisalso possibility of misleading outcomes (Fenwick 2016). For example the programs oragentsmightlookforspecifictypeofpatternsthatareexpectedby researchers in any specific data set so on. This can also harm groups or individuals. NetworkingMoreover, there are different kinds of risk of potential invasion over privacy while monitoring various live networks. Here, different ethicist can also asks as users of computer network have been an effective subject of study that they themselves have been studying. Above all, it has been their use that has created different kinds of patterns of traffic. These have been taking place for interest for researchers. Software Engineering Various significant quantity of research at the sector has been involved human beings. This is because people maintain, use, implement and design software systems. Here, the researches commonly include observing people, teams and complete organization with the related risk of damage (Waycott et al. 2016). Computer Science Education This involves has been trying to keep up with different high speed of technological modifications that has stressed computer science and engineering. Various courses specially have somewhere experimental as educators have been finding new methods to educate socio-economically, age, gender and ethnically
9RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING diverse students. This research, very often has involved the investigators to be trained in education research. However this has been not so far any universal phenomenon. CryptographyThe strength of cryptography has needed to be evaluated and tested. However what happens here is that researchers have been finding the more effective measures for cracking any cipher. Here the publication comprises of various immediate and serious efforts regarding huge amounts of people and for many organizations (Jefrey 2018). However, this has promoted the higher good trough recognizing strategies and weaknesses for the correction. 4.2. Methodology review: Qualitative researches: For this been naturalistic inquiry is to be done. This would help in finding the in detailed understanding of social phenomenon under natural setting. For these research problems would to be research questions on the basis of previous research experience. Here the data would collect through interviews at various IT organizations United Kingdom. At the current scenario, the focus must be on finding “why” ethical dilemmas have been originating computing instead of “what” the social phenomenon has been. It has been relying on the direct experience of people as meaning-making agents in daily lives. Instead of statistical and logical procedures, the qualitative researchers utilize numerous systems of inquiry for studying human phenomenon. This must include the case study, discourse analysis, grounded theory, phenomenology and historical analysis of employees of IT companies at U.K.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING The set of questions must be focusing on areas such as cultures, societies and individuals and communication and language. It must be reminded that knowledge is subjective in this case instead of objective. Further, the researchers should learn from participants for understanding the meaning of their lives. Further, they must assure trustworthiness and rigor. The researcher must attempt to maintain position of neutrality while been engaged in research process.
11RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING Quantitative research: The quantitative research for the current case of ethics in computing is would be done though collecting information through sampling methods. Here online surveys must be done from potential and existing employees of various IT companies of U.K. Those must be analyzed trough statistical methods. The results obtained would be numerical and it would be helpful to predict the future outcomes and undertake decisions accordingly. The research template should be elaborate, objective and investigational in nature. Further, the results must be unbiased, statistical and logical. The data collectionshouldbedoneusingastructuredmethodandconductedoverawidersample, representing almost the entire population. The survey research for this current scenario would be through social media. Employees of many small and large companies have been always proving feedbacks at social media platforms, along with quality of new features and various other details. Through conducting survey researches at social media data can be collected from various pool of customers and then it must be collected to create numerical results. 4.3. Selection: Tools:A scorecard must be maintained during the interview. It must include a checklist measuring reactions that are collected from employees of different IT companies. Techniques:The first technique that can be used here is clearly defining the purpose of the online survey. For example, the SurveyMonkey has been an effective web-based online survey tool. This is needed to be packed with industry-leading features. It is designed through various noted market researchers. Next the survey must be kept focused and short. This must be helpful to focus on both the quantity and quality of response. Thirdly, the questions must be simple, direct and specific as possible. Closed ended questions must be used whenever possible. This provides respondents
12RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING particular choices making that easy to analyze results. The rating scale must be maintained consistently across the overall survey. Here the rating scales must be done from 1 to 5. Lastly, a logical ordering must be maintained. Fourthly, for the above employee survey, the survey invitations must be sent while the business week goes on and at there are various time suitable for business. Next, various reminders are to be sent. The sending of reminders to the people who has not been responded before would provide significant boost in the rate of response. Methodologies:Keepingmindthetypeofe-surveychosenabove,therearetwokindsof methodologies to be considered that must be explored. At first the choice of specific survey methodology has not been implying that follow-up and solicitation requests must use the similar approach. Here, a mixed-mode design can be considered to keep the unique requirements of the research intact along with target population. The second consideration should be focusing on focusing on various approaches to plan for, cope up with and different technical malfunctions. However,itmustbekeptinmindthattransmissionerrors,networkoverloadandnetwork availability can exist as the point of contact have its individual technical troubles. 5. Project Plan: WBSTask NameDurationStartFinishPredecessors 0Research on ethics and professionalism in computing 29 daysFri 6/1/18Wed 7/11/18 1Pilot Study on online survey and interviews 3 daysFri 6/1/18Tue 6/5/18 2Executing online surveys and interviews 9 daysWed 6/6/18Mon 6/18/181 3Assessment of outcomes3 daysThuMon 6/25/182
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING collected from the interviews and surveys 6/21/18 4Writing down the ultimate evaluation 7 daysTue 6/26/18Wed 7/4/183 5Analyzing the final results5 daysThu 7/5/18Wed 7/11/184 Figure 1: “Gantt Chart regarding the current research on research, ethics, and professionalism in Computing” (Source: Created by Author) 6. Ethical Review Form: Section I: Different Project Details _________________ Section II: The Applicant Details ________________ Section III: For Student’s purpouse
14RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING ___________________ Section IV: Module Tutors/Dissertation Supervisors ______________________ Section V: For every Research Applicants ______________________ Section VI: The Checklist of Research Ethics ______________________
15RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING 7. Consent Form: The Ethics of Surveillance in the Workplace Research Consent Form Participants Signature:_________________________________ Date:___________________________ Researcher’s Signature:__________________________________ Date:____________________________ 8. Pilot study: 1. Mention your gender: Male Female 2. Mention your organization sector-type: Public Private
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING Non-for profit organization 3. Duration of experience in this organization (in years)? Less than 1 1 TO 5 More than 5 4. What is your job type? Marketing Manager Security Professional Others 5. Please mention how your company has been dealing with the type of computing as service to other human beings? 6. Mention the way in which you can deal with the real nature of computing? 7. Have your organization properly conveyed the sense of professional responsibility? 8. Have you company properly sensitizing you all in terms of compouter ethics issues? 9. How have your company been supplying ways and tools of analyzing those cases?
17RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING 9. Conclusion: Theresearchesincomputinghavebeensomewhereisolatedfromtheworldthrough keyboardandscreens.However,heretheubiquityofcomputinginthecurrentscenariohas demanded the fact that the responsibility towardsthesociety must come into that position. The above study helps in understanding that consummation of this assimilation between ethics and computing cannot take place all of a sudden. It would take more years to come into reality. It is not a static and single vent. It is a dynamic process evolving with the rise of technological experience and knowledge. In the above paper, steps towards that direction are analyzed in an attempt to built awareness and instigate dialogue between various disciplines in developing ethical standards regarding research on computer science. Further, it is understood that ethics courses for computing has been aimed to raise ability of future professionals to solve and recognize different ethical problems, perspectives and pluralism. Thus they create habit and skills to think rationally about ethical issues and prepare students for various challenges in their profession. Thus the above report is encouraging for researchers for understanding various ethical norms in computing. This study has identified problems that have been relating to different types computer ethics with reference to accessibility, property, privacy along accuracy. It has also investigated various root causes and suggested various proposals about those problems. This is done with the help of various ICT practitioners. However, it must be reminded that application of code of ethics has not yielded the clear-cut solution for ethical problems. This is because various principles in the code flight have been conflicting. Here, for example, the principles of confidentiality and honesty can conflict as the professionals are questioned regarding various technical details for the forthcoming product of employees.
18RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING 10.Appendix: Figure 2: “Software Engineering Code of Ethics” (Source: Computer.org, 2018)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING Figure 3: “Ethics and technology” (Source: Infosectoday.com, 2018)
20RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING 11.References: Blažun Vošner, H., Železnik, D., Kokol, P., Vošner, J. and Završnik, J., 2017. Trends in nursing ethics research: Mapping the literature production.Nursing ethics,24(8), pp.892-907. Bryman, A. and Bell, E., 2015.Business research methods. Oxford University Press, USA. Computer.org. (2018).Software Engineering Code of Ethics • IEEE Computer Society. [online] Available at: https://www.computer.org/web/education/code-of-ethics [Accessed 30 Apr. 2018]. Eke, D.O., Stahl, B.C. and Fidler, C., 2015. Understanding the relevance of ethics reviews of ICT research in UK computing departments using dialectical hermeneutics.Journal of Information, Communication and Ethics in Society,13(1), pp.28-38. Fenwick,T.,2016.Socialmedia,professionalismandhighereducation:asociomaterial consideration.Studies in Higher Education,41(4), pp.664-677. Gotterbarn, D.W., Bruckman, A., Flick, C., Miller, K. and Wolf, M.J., 2018. ACM code of ethics: a guide for positive action. Infosectoday.com.(2018).IntroductiontoComputerEthics.[online]Availableat: http://www.infosectoday.com/Articles/Intro_Computer_Ethics.htm [Accessed 30 Apr. 2018]. Iqbal, J. and Beigh, B.M., 2017. Computer Ethics from Obscure to Ubiquitous.International Journal of Advanced Research in Computer Science,8(3). Jefrey, C. ed., 2018.Research on professional responsibility and ethics in accounting. Emerald Publishing Limited.