Professional Ethics in Computing
VerifiedAdded on 2021/06/17
|21
|4436
|181
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
Research, Ethics, and Professionalism in Computing
Name of the student:
Name of the university:
Author Note
Research, Ethics, and Professionalism in Computing
Name of the student:
Name of the university:
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
Abstract
The report has demonstrated various ethical issues like conflict of interests. It has been common for
various professions. At engineering and computing, the distinct ethical challenges has been
developed from creating of machines. There external behaviors has been e=resembling human
behaviors that are regarded as intelligent. Since, the machines of current world has been more
sophisticated and versatile, they have been rousingly taking the tasks that are assigned to humans.
This also includes engineers and comparing experts which should rethink about their relationships
for the artifacts that are deployed, developed and designed them. For this, the represent study is
aimed to find out issues that related to ethics of computers regarding accessibility, property,
accuracy and privacy. Further, the study aims to analyze the origins of those challenges. Besides, it
has suggested problems with the help of practitioners with ICT background.
Abstract
The report has demonstrated various ethical issues like conflict of interests. It has been common for
various professions. At engineering and computing, the distinct ethical challenges has been
developed from creating of machines. There external behaviors has been e=resembling human
behaviors that are regarded as intelligent. Since, the machines of current world has been more
sophisticated and versatile, they have been rousingly taking the tasks that are assigned to humans.
This also includes engineers and comparing experts which should rethink about their relationships
for the artifacts that are deployed, developed and designed them. For this, the represent study is
aimed to find out issues that related to ethics of computers regarding accessibility, property,
accuracy and privacy. Further, the study aims to analyze the origins of those challenges. Besides, it
has suggested problems with the help of practitioners with ICT background.
2RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
Table of Contents
1. Background:.......................................................................................................................................3
2. Research questions:...........................................................................................................................3
3. Literature review:...............................................................................................................................4
3.1. Past developments and history:..................................................................................................4
3.2. Present situation:.........................................................................................................................5
3.3. Ethical issues:.............................................................................................................................6
3.4 Identification of gaps in knowledge requiring to be addressed:..................................................6
4. Methodology Review:.......................................................................................................................7
4.1. Range of research approaches:...................................................................................................7
4.2. Methodology review:..................................................................................................................9
4.3. Selection:..................................................................................................................................10
5. Project Plan:.....................................................................................................................................11
6. Ethical Review Form:......................................................................................................................12
7. Consent Form:.................................................................................................................................14
8. Pilot study:.......................................................................................................................................14
9. Conclusion:......................................................................................................................................16
10. Appendix:......................................................................................................................................17
11. References:....................................................................................................................................19
Table of Contents
1. Background:.......................................................................................................................................3
2. Research questions:...........................................................................................................................3
3. Literature review:...............................................................................................................................4
3.1. Past developments and history:..................................................................................................4
3.2. Present situation:.........................................................................................................................5
3.3. Ethical issues:.............................................................................................................................6
3.4 Identification of gaps in knowledge requiring to be addressed:..................................................6
4. Methodology Review:.......................................................................................................................7
4.1. Range of research approaches:...................................................................................................7
4.2. Methodology review:..................................................................................................................9
4.3. Selection:..................................................................................................................................10
5. Project Plan:.....................................................................................................................................11
6. Ethical Review Form:......................................................................................................................12
7. Consent Form:.................................................................................................................................14
8. Pilot study:.......................................................................................................................................14
9. Conclusion:......................................................................................................................................16
10. Appendix:......................................................................................................................................17
11. References:....................................................................................................................................19
3RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
1. Background:
The Ethical conduct of research has been an important cornerstone of current day scientific
research. The area of computer science and various technological artifacts has been touching all
aspects of current life. Hence, the researchers have needed to report and conduct research in an
ethical way. Ethical review has not been just about preventing or making it difficult to conduct
research. It has been about helping the researcher thing through various issues and the ways to relate
them. Principles of good research practice encourage the individuals included in research. They also
considered the wider consequence of the research. Further, it has been helpful to engage intellectual,
ethical and practical challenges that are inherent to high quality research.
The potential ethical dilemmas faced in this discipline are needed to be investigated. An
analysis is also required on how ethical concerns have been addressed in those cases. Hence the
research on professionalism and ethics in computing is chosen to look into future development as the
code for ethical research on computer science. Ethics in computing has urged different kinds of
scholars for revisiting technologies and its values. Moreover, though ethics in computer has been
falling under the field related between the areas of science and ethics, it has been a unique and
holistic type of disciplines. It provides principle to understand, conceptualize and use of computer
technology.
The following report has discussed various research questions on the above area. Then
relevant literatures are reviewed that identifies various gaps. Next a critical review is done on
various research methods and the available methods are discussed as per the research question.
Lastly an in-depth project plan is demonstrated in this study.
1. Background:
The Ethical conduct of research has been an important cornerstone of current day scientific
research. The area of computer science and various technological artifacts has been touching all
aspects of current life. Hence, the researchers have needed to report and conduct research in an
ethical way. Ethical review has not been just about preventing or making it difficult to conduct
research. It has been about helping the researcher thing through various issues and the ways to relate
them. Principles of good research practice encourage the individuals included in research. They also
considered the wider consequence of the research. Further, it has been helpful to engage intellectual,
ethical and practical challenges that are inherent to high quality research.
The potential ethical dilemmas faced in this discipline are needed to be investigated. An
analysis is also required on how ethical concerns have been addressed in those cases. Hence the
research on professionalism and ethics in computing is chosen to look into future development as the
code for ethical research on computer science. Ethics in computing has urged different kinds of
scholars for revisiting technologies and its values. Moreover, though ethics in computer has been
falling under the field related between the areas of science and ethics, it has been a unique and
holistic type of disciplines. It provides principle to understand, conceptualize and use of computer
technology.
The following report has discussed various research questions on the above area. Then
relevant literatures are reviewed that identifies various gaps. Next a critical review is done on
various research methods and the available methods are discussed as per the research question.
Lastly an in-depth project plan is demonstrated in this study.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
2. Research questions:
The various ethical implications of the researches should include the following.
How to make deal with actual nature of computing for the service to other human beings?
How to convey different senses of professional responsibilities?
How to sensitize employees in business regarding computer ethics issues?
How can one provide methods and tools to analyze cases?
3. Literature review:
3.1. Past developments and history:
Improper use of information technology is the method to disturb property and privacy
creating various ethical dilemmas. It has lead to ethical issues about the usage of technology. The
term has been first used in mid 60s as the application for various fields of professional ethics. This
was transformed and decreased with the help of the emergence of computers. As per the article by
Iqbal and Beigh (2017) ethics in computing is defined as the complex and dynamic field involving
values, policies, ideas and facts. This idea has not been considered as the entity of computer
sociology and computer technology till 1990. Till present years a transformation is witnessed in
understanding computer ethics leading to field to involve computer ethics, technological values,
computer technology, computer sociology and ethics. Stahl (2014) showed that computing ethics has
neither been the ethical principles to abide by or the technology that has been deprived of particular
values as deploying those principles. In this way the computer ethics has been urging scholars in
revisiting computer technologies. The computer has been a distinct and holistic approach that
provides various principles to understand, conceptualize and the using computer technology.
2. Research questions:
The various ethical implications of the researches should include the following.
How to make deal with actual nature of computing for the service to other human beings?
How to convey different senses of professional responsibilities?
How to sensitize employees in business regarding computer ethics issues?
How can one provide methods and tools to analyze cases?
3. Literature review:
3.1. Past developments and history:
Improper use of information technology is the method to disturb property and privacy
creating various ethical dilemmas. It has lead to ethical issues about the usage of technology. The
term has been first used in mid 60s as the application for various fields of professional ethics. This
was transformed and decreased with the help of the emergence of computers. As per the article by
Iqbal and Beigh (2017) ethics in computing is defined as the complex and dynamic field involving
values, policies, ideas and facts. This idea has not been considered as the entity of computer
sociology and computer technology till 1990. Till present years a transformation is witnessed in
understanding computer ethics leading to field to involve computer ethics, technological values,
computer technology, computer sociology and ethics. Stahl (2014) showed that computing ethics has
neither been the ethical principles to abide by or the technology that has been deprived of particular
values as deploying those principles. In this way the computer ethics has been urging scholars in
revisiting computer technologies. The computer has been a distinct and holistic approach that
provides various principles to understand, conceptualize and the using computer technology.
5RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
3.2. Present situation:
In the current era computing is a fast developing field making that hard to predict what would
be coming next. Apart from this, it has been clear that individuals and information society in the
society has been moving on confronting radical societal and technological developments. This has
lead to create latest patterns for behavior and then accommodate those developments as per as
Bryman and Bell (2015). Under this situation, the shaping of those processes of behavior generation,
idea of computing ethics is emphasized along with the idea of professional ethics. Besides, the idea
of computing ethics has not been analyze currently under the framework ICT-related professional
ethics. Instead this must be investigated under the framework of different personal ethics. This is
also needed to be followed by different kinds of people of information society.
At the present era, Weckert (2017) mentions that there have been rise in competition and
development in the current information society that is been maintained through the ability of people
for getting into information easily and fast. Further, the interpretation production and consumption
of data has been carrying too much importance. In this regard, various access tools of information
have possessed a vital place in the society of information. Here, the information technologies have
not been influencing and transforming the ways in which people live. It has been ways in which
rituals in the society is utilized. However, Gotterbarn et al. (2018) has showed that there have been
many optimists and pessimists present for this transformation. Further, there have been the
individuals who have believed that there has been a reverse type of relationship that has been
existing between society and technology. It has lead to assumption that the technology has been sued
for negative and positive purposes. Further, it has been clear that the technology has providing
people and society with various advantages through serious ethical issues. At the present state, as
3.2. Present situation:
In the current era computing is a fast developing field making that hard to predict what would
be coming next. Apart from this, it has been clear that individuals and information society in the
society has been moving on confronting radical societal and technological developments. This has
lead to create latest patterns for behavior and then accommodate those developments as per as
Bryman and Bell (2015). Under this situation, the shaping of those processes of behavior generation,
idea of computing ethics is emphasized along with the idea of professional ethics. Besides, the idea
of computing ethics has not been analyze currently under the framework ICT-related professional
ethics. Instead this must be investigated under the framework of different personal ethics. This is
also needed to be followed by different kinds of people of information society.
At the present era, Weckert (2017) mentions that there have been rise in competition and
development in the current information society that is been maintained through the ability of people
for getting into information easily and fast. Further, the interpretation production and consumption
of data has been carrying too much importance. In this regard, various access tools of information
have possessed a vital place in the society of information. Here, the information technologies have
not been influencing and transforming the ways in which people live. It has been ways in which
rituals in the society is utilized. However, Gotterbarn et al. (2018) has showed that there have been
many optimists and pessimists present for this transformation. Further, there have been the
individuals who have believed that there has been a reverse type of relationship that has been
existing between society and technology. It has lead to assumption that the technology has been sued
for negative and positive purposes. Further, it has been clear that the technology has providing
people and society with various advantages through serious ethical issues. At the present state, as
6RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
ignored, those accompanying issues have been interfering with different moral mechanisms and
societal values.
3.3. Ethical issues:
There have been four ethical issues identified in computing in the present age. They are
accessibility, property, accuracy and privacy. Here, the growth of information technology has been
the ability for control, different information processing, retrieval and storage and rise in value of
various kinds of information under the decision-making. This has leaded the decision makers in
acquiring personal information through invading that privacy. Further, Kanabar et al. (2016)
mentioned that accuracy has been highly related to various correctness of information. This has been
delivered through ICTs. The data is used for mismanaging the life of people especially when the
party using improper data possesses more authority and data. Here, the most complicated and
confronted ethical issues are the query regarding intellectual property rights. Further, data has been
quite expensive in producing the first instance. Reproduction and transmission of information has
been problematic. This is because it has been able to invade the product rights claimed Eke, Stahl
and Fidler (2015). Lastly, the accessibility is also referred to here. This denotes the various
conditions under which individuals or organization has possessed the privilege or right to retrieve
information. The principles have constituted the starting point. Hence it has been needed to find out
the principles and rules and create consensus under society. This is done through conducting
investigations on the basis of those principles.
3.4 Identification of gaps in knowledge requiring to be addressed:
The rise in number of social science and education researches has conducted and designed
various online researches. There has been various policy gaps found in the researches like as done by
McAuliffe and Nipperess (2017). This also included range of groups and stakeholders having the
ignored, those accompanying issues have been interfering with different moral mechanisms and
societal values.
3.3. Ethical issues:
There have been four ethical issues identified in computing in the present age. They are
accessibility, property, accuracy and privacy. Here, the growth of information technology has been
the ability for control, different information processing, retrieval and storage and rise in value of
various kinds of information under the decision-making. This has leaded the decision makers in
acquiring personal information through invading that privacy. Further, Kanabar et al. (2016)
mentioned that accuracy has been highly related to various correctness of information. This has been
delivered through ICTs. The data is used for mismanaging the life of people especially when the
party using improper data possesses more authority and data. Here, the most complicated and
confronted ethical issues are the query regarding intellectual property rights. Further, data has been
quite expensive in producing the first instance. Reproduction and transmission of information has
been problematic. This is because it has been able to invade the product rights claimed Eke, Stahl
and Fidler (2015). Lastly, the accessibility is also referred to here. This denotes the various
conditions under which individuals or organization has possessed the privilege or right to retrieve
information. The principles have constituted the starting point. Hence it has been needed to find out
the principles and rules and create consensus under society. This is done through conducting
investigations on the basis of those principles.
3.4 Identification of gaps in knowledge requiring to be addressed:
The rise in number of social science and education researches has conducted and designed
various online researches. There has been various policy gaps found in the researches like as done by
McAuliffe and Nipperess (2017). This also included range of groups and stakeholders having the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
role or attempting to play the role to form better policies regarding ethics. There have been various
complexities around applying human subject model for conducting internet research that has needed
to be explored. This includes problems of privacy, informed consent and anonymity.
Further, the discourse regarding computing ethics has comprised various resolutions that have
needed approaches and ideas. There has been convergence of technologies taking place and various
kinds of presently created fields of technology that have been intimately inter-linked to the field of
computing. Tractenberg et al. (2015) highlighted that, here the shift in focus towards information
from computing has moved towards defining different kinds of boundaries of computer ethics. Thus
it has not necessarily addressing the primary challenges of the unclear practical relevance. Further,
the complaints regarding lack of relevance has not been confined under this type of ethics. The
reason is that decision in IS on relationship to rigor versus relevance. Moreover, Blažun et al. (2017)
highlighted that it has been plausible in thinking that raising the ubiquitous nature of computing
technologies. This has called for reflection of various inter-related ethical concerns under public
discourse and various policies. This has been for a stronger presence of computer ethics. This take
place under those public discussions that is needed to be desirable.
4. Methodology Review:
4.1. Range of research approaches:
The various potential research areas for research, ethics, and professionalism in Computing
are listed below.
Graphics and
Virtual Reality
This includes alternative representations of different non-graphic information
(Langendyk, Mason and Wang 2016). This also includes creation of nearly
complete sensory environments that might exist in reality. This has been very
role or attempting to play the role to form better policies regarding ethics. There have been various
complexities around applying human subject model for conducting internet research that has needed
to be explored. This includes problems of privacy, informed consent and anonymity.
Further, the discourse regarding computing ethics has comprised various resolutions that have
needed approaches and ideas. There has been convergence of technologies taking place and various
kinds of presently created fields of technology that have been intimately inter-linked to the field of
computing. Tractenberg et al. (2015) highlighted that, here the shift in focus towards information
from computing has moved towards defining different kinds of boundaries of computer ethics. Thus
it has not necessarily addressing the primary challenges of the unclear practical relevance. Further,
the complaints regarding lack of relevance has not been confined under this type of ethics. The
reason is that decision in IS on relationship to rigor versus relevance. Moreover, Blažun et al. (2017)
highlighted that it has been plausible in thinking that raising the ubiquitous nature of computing
technologies. This has called for reflection of various inter-related ethical concerns under public
discourse and various policies. This has been for a stronger presence of computer ethics. This take
place under those public discussions that is needed to be desirable.
4. Methodology Review:
4.1. Range of research approaches:
The various potential research areas for research, ethics, and professionalism in Computing
are listed below.
Graphics and
Virtual Reality
This includes alternative representations of different non-graphic information
(Langendyk, Mason and Wang 2016). This also includes creation of nearly
complete sensory environments that might exist in reality. This has been very
8RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
much human perception as those representations get manipulated and created is
needed for human perception.
KDDM or
Knowledge
Discovery and
Data Mining
Diverse and huge data sets are manipulated and examined due to extraction is
hidden patterns and knowledge that has not be observable otherwise. It has been
commonly using tireless and faster type of human surrogates. Here the potential
has been existing for attack on personal privacy. Further, there is also
possibility of misleading outcomes (Fenwick 2016). For example the programs
or agents might look for specific type of patterns that are expected by
researchers in any specific data set so on. This can also harm groups or
individuals.
Networking Moreover, there are different kinds of risk of potential invasion over privacy
while monitoring various live networks. Here, different ethicist can also asks as
users of computer network have been an effective subject of study that they
themselves have been studying. Above all, it has been their use that has created
different kinds of patterns of traffic. These have been taking place for interest
for researchers.
Software
Engineering
Various significant quantity of research at the sector has been involved human
beings. This is because people maintain, use, implement and design software
systems. Here, the researches commonly include observing people, teams and
complete organization with the related risk of damage (Waycott et al. 2016).
Computer
Science
Education
This involves has been trying to keep up with different high speed of
technological modifications that has stressed computer science and engineering.
Various courses specially have somewhere experimental as educators have been
finding new methods to educate socio-economically, age, gender and ethnically
much human perception as those representations get manipulated and created is
needed for human perception.
KDDM or
Knowledge
Discovery and
Data Mining
Diverse and huge data sets are manipulated and examined due to extraction is
hidden patterns and knowledge that has not be observable otherwise. It has been
commonly using tireless and faster type of human surrogates. Here the potential
has been existing for attack on personal privacy. Further, there is also
possibility of misleading outcomes (Fenwick 2016). For example the programs
or agents might look for specific type of patterns that are expected by
researchers in any specific data set so on. This can also harm groups or
individuals.
Networking Moreover, there are different kinds of risk of potential invasion over privacy
while monitoring various live networks. Here, different ethicist can also asks as
users of computer network have been an effective subject of study that they
themselves have been studying. Above all, it has been their use that has created
different kinds of patterns of traffic. These have been taking place for interest
for researchers.
Software
Engineering
Various significant quantity of research at the sector has been involved human
beings. This is because people maintain, use, implement and design software
systems. Here, the researches commonly include observing people, teams and
complete organization with the related risk of damage (Waycott et al. 2016).
Computer
Science
Education
This involves has been trying to keep up with different high speed of
technological modifications that has stressed computer science and engineering.
Various courses specially have somewhere experimental as educators have been
finding new methods to educate socio-economically, age, gender and ethnically
9RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
diverse students. This research, very often has involved the investigators to be
trained in education research. However this has been not so far any universal
phenomenon.
Cryptography The strength of cryptography has needed to be evaluated and tested. However
what happens here is that researchers have been finding the more effective
measures for cracking any cipher. Here the publication comprises of various
immediate and serious efforts regarding huge amounts of people and for many
organizations (Jefrey 2018). However, this has promoted the higher good trough
recognizing strategies and weaknesses for the correction.
4.2. Methodology review:
Qualitative researches:
For this been naturalistic inquiry is to be done. This would help in finding the in detailed
understanding of social phenomenon under natural setting. For these research problems would to be
research questions on the basis of previous research experience. Here the data would collect through
interviews at various IT organizations United Kingdom.
At the current scenario, the focus must be on finding “why” ethical dilemmas have been
originating computing instead of “what” the social phenomenon has been. It has been relying on the
direct experience of people as meaning-making agents in daily lives. Instead of statistical and logical
procedures, the qualitative researchers utilize numerous systems of inquiry for studying human
phenomenon. This must include the case study, discourse analysis, grounded theory, phenomenology
and historical analysis of employees of IT companies at U.K.
diverse students. This research, very often has involved the investigators to be
trained in education research. However this has been not so far any universal
phenomenon.
Cryptography The strength of cryptography has needed to be evaluated and tested. However
what happens here is that researchers have been finding the more effective
measures for cracking any cipher. Here the publication comprises of various
immediate and serious efforts regarding huge amounts of people and for many
organizations (Jefrey 2018). However, this has promoted the higher good trough
recognizing strategies and weaknesses for the correction.
4.2. Methodology review:
Qualitative researches:
For this been naturalistic inquiry is to be done. This would help in finding the in detailed
understanding of social phenomenon under natural setting. For these research problems would to be
research questions on the basis of previous research experience. Here the data would collect through
interviews at various IT organizations United Kingdom.
At the current scenario, the focus must be on finding “why” ethical dilemmas have been
originating computing instead of “what” the social phenomenon has been. It has been relying on the
direct experience of people as meaning-making agents in daily lives. Instead of statistical and logical
procedures, the qualitative researchers utilize numerous systems of inquiry for studying human
phenomenon. This must include the case study, discourse analysis, grounded theory, phenomenology
and historical analysis of employees of IT companies at U.K.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
The set of questions must be focusing on areas such as cultures, societies and individuals and
communication and language. It must be reminded that knowledge is subjective in this case instead
of objective. Further, the researchers should learn from participants for understanding the meaning
of their lives. Further, they must assure trustworthiness and rigor. The researcher must attempt to
maintain position of neutrality while been engaged in research process.
The set of questions must be focusing on areas such as cultures, societies and individuals and
communication and language. It must be reminded that knowledge is subjective in this case instead
of objective. Further, the researchers should learn from participants for understanding the meaning
of their lives. Further, they must assure trustworthiness and rigor. The researcher must attempt to
maintain position of neutrality while been engaged in research process.
11RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
Quantitative research:
The quantitative research for the current case of ethics in computing is would be done though
collecting information through sampling methods. Here online surveys must be done from potential
and existing employees of various IT companies of U.K. Those must be analyzed trough statistical
methods. The results obtained would be numerical and it would be helpful to predict the future
outcomes and undertake decisions accordingly. The research template should be elaborate, objective
and investigational in nature. Further, the results must be unbiased, statistical and logical. The data
collection should be done using a structured method and conducted over a wider sample,
representing almost the entire population.
The survey research for this current scenario would be through social media. Employees of
many small and large companies have been always proving feedbacks at social media platforms,
along with quality of new features and various other details. Through conducting survey researches
at social media data can be collected from various pool of customers and then it must be collected to
create numerical results.
4.3. Selection:
Tools: A scorecard must be maintained during the interview. It must include a checklist measuring
reactions that are collected from employees of different IT companies.
Techniques: The first technique that can be used here is clearly defining the purpose of the online
survey. For example, the SurveyMonkey has been an effective web-based online survey tool. This is
needed to be packed with industry-leading features. It is designed through various noted market
researchers. Next the survey must be kept focused and short. This must be helpful to focus on both
the quantity and quality of response. Thirdly, the questions must be simple, direct and specific as
possible. Closed ended questions must be used whenever possible. This provides respondents
Quantitative research:
The quantitative research for the current case of ethics in computing is would be done though
collecting information through sampling methods. Here online surveys must be done from potential
and existing employees of various IT companies of U.K. Those must be analyzed trough statistical
methods. The results obtained would be numerical and it would be helpful to predict the future
outcomes and undertake decisions accordingly. The research template should be elaborate, objective
and investigational in nature. Further, the results must be unbiased, statistical and logical. The data
collection should be done using a structured method and conducted over a wider sample,
representing almost the entire population.
The survey research for this current scenario would be through social media. Employees of
many small and large companies have been always proving feedbacks at social media platforms,
along with quality of new features and various other details. Through conducting survey researches
at social media data can be collected from various pool of customers and then it must be collected to
create numerical results.
4.3. Selection:
Tools: A scorecard must be maintained during the interview. It must include a checklist measuring
reactions that are collected from employees of different IT companies.
Techniques: The first technique that can be used here is clearly defining the purpose of the online
survey. For example, the SurveyMonkey has been an effective web-based online survey tool. This is
needed to be packed with industry-leading features. It is designed through various noted market
researchers. Next the survey must be kept focused and short. This must be helpful to focus on both
the quantity and quality of response. Thirdly, the questions must be simple, direct and specific as
possible. Closed ended questions must be used whenever possible. This provides respondents
12RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
particular choices making that easy to analyze results. The rating scale must be maintained
consistently across the overall survey. Here the rating scales must be done from 1 to 5. Lastly, a
logical ordering must be maintained. Fourthly, for the above employee survey, the survey invitations
must be sent while the business week goes on and at there are various time suitable for business.
Next, various reminders are to be sent. The sending of reminders to the people who has not been
responded before would provide significant boost in the rate of response.
Methodologies: Keeping mind the type of e-survey chosen above, there are two kinds of
methodologies to be considered that must be explored. At first the choice of specific survey
methodology has not been implying that follow-up and solicitation requests must use the similar
approach. Here, a mixed-mode design can be considered to keep the unique requirements of the
research intact along with target population. The second consideration should be focusing on
focusing on various approaches to plan for, cope up with and different technical malfunctions.
However, it must be kept in mind that transmission errors, network overload and network
availability can exist as the point of contact have its individual technical troubles.
5. Project Plan:
WBS Task Name Duration Start Finish Predecessors
0 Research on ethics and
professionalism in computing
29 days Fri 6/1/18 Wed 7/11/18
1 Pilot Study on online
survey and interviews
3 days Fri 6/1/18 Tue 6/5/18
2 Executing online surveys
and interviews
9 days Wed 6/6/18 Mon 6/18/18 1
3 Assessment of outcomes 3 days Thu Mon 6/25/18 2
particular choices making that easy to analyze results. The rating scale must be maintained
consistently across the overall survey. Here the rating scales must be done from 1 to 5. Lastly, a
logical ordering must be maintained. Fourthly, for the above employee survey, the survey invitations
must be sent while the business week goes on and at there are various time suitable for business.
Next, various reminders are to be sent. The sending of reminders to the people who has not been
responded before would provide significant boost in the rate of response.
Methodologies: Keeping mind the type of e-survey chosen above, there are two kinds of
methodologies to be considered that must be explored. At first the choice of specific survey
methodology has not been implying that follow-up and solicitation requests must use the similar
approach. Here, a mixed-mode design can be considered to keep the unique requirements of the
research intact along with target population. The second consideration should be focusing on
focusing on various approaches to plan for, cope up with and different technical malfunctions.
However, it must be kept in mind that transmission errors, network overload and network
availability can exist as the point of contact have its individual technical troubles.
5. Project Plan:
WBS Task Name Duration Start Finish Predecessors
0 Research on ethics and
professionalism in computing
29 days Fri 6/1/18 Wed 7/11/18
1 Pilot Study on online
survey and interviews
3 days Fri 6/1/18 Tue 6/5/18
2 Executing online surveys
and interviews
9 days Wed 6/6/18 Mon 6/18/18 1
3 Assessment of outcomes 3 days Thu Mon 6/25/18 2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
collected from the interviews
and surveys
6/21/18
4 Writing down the ultimate
evaluation
7 days Tue 6/26/18 Wed 7/4/18 3
5 Analyzing the final results 5 days Thu 7/5/18 Wed 7/11/18 4
Figure 1: “Gantt Chart regarding the current research on research, ethics, and
professionalism in Computing”
(Source: Created by Author)
6. Ethical Review Form:
Section I: Different Project Details
_________________
Section II: The Applicant Details
________________
Section III: For Student’s purpouse
collected from the interviews
and surveys
6/21/18
4 Writing down the ultimate
evaluation
7 days Tue 6/26/18 Wed 7/4/18 3
5 Analyzing the final results 5 days Thu 7/5/18 Wed 7/11/18 4
Figure 1: “Gantt Chart regarding the current research on research, ethics, and
professionalism in Computing”
(Source: Created by Author)
6. Ethical Review Form:
Section I: Different Project Details
_________________
Section II: The Applicant Details
________________
Section III: For Student’s purpouse
14RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
___________________
Section IV: Module Tutors/Dissertation Supervisors
______________________
Section V: For every Research Applicants
______________________
Section VI: The Checklist of Research Ethics
______________________
___________________
Section IV: Module Tutors/Dissertation Supervisors
______________________
Section V: For every Research Applicants
______________________
Section VI: The Checklist of Research Ethics
______________________
15RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
7. Consent Form:
The Ethics of Surveillance in the Workplace Research Consent Form
Participants Signature: _________________________________
Date: ___________________________
Researcher’s Signature: __________________________________
Date: ____________________________
8. Pilot study:
1. Mention your gender:
Male
Female
2. Mention your organization sector-type:
Public
Private
7. Consent Form:
The Ethics of Surveillance in the Workplace Research Consent Form
Participants Signature: _________________________________
Date: ___________________________
Researcher’s Signature: __________________________________
Date: ____________________________
8. Pilot study:
1. Mention your gender:
Male
Female
2. Mention your organization sector-type:
Public
Private
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
Non-for profit organization
3. Duration of experience in this organization (in years)?
Less than 1
1 TO 5
More than 5
4. What is your job type?
Marketing
Manager
Security
Professional
Others
5. Please mention how your company has been dealing with the type of computing as service to
other human beings?
6. Mention the way in which you can deal with the real nature of computing?
7. Have your organization properly conveyed the sense of professional responsibility?
8. Have you company properly sensitizing you all in terms of compouter ethics issues?
9. How have your company been supplying ways and tools of analyzing those cases?
Non-for profit organization
3. Duration of experience in this organization (in years)?
Less than 1
1 TO 5
More than 5
4. What is your job type?
Marketing
Manager
Security
Professional
Others
5. Please mention how your company has been dealing with the type of computing as service to
other human beings?
6. Mention the way in which you can deal with the real nature of computing?
7. Have your organization properly conveyed the sense of professional responsibility?
8. Have you company properly sensitizing you all in terms of compouter ethics issues?
9. How have your company been supplying ways and tools of analyzing those cases?
17RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
9. Conclusion:
The researches in computing have been somewhere isolated from the world through
keyboard and screens. However, here theubiquity of computing in the current scenario has
demanded the fact that the responsibility towards thesociety must come into that position. The
above study helps in understanding that consummation of this assimilation between ethics and
computing cannot take place all of a sudden. It would take more years to come into reality. It is not a
static and single vent. It is a dynamic process evolving with the rise of technological experience and
knowledge. In the above paper, steps towards that direction are analyzed in an attempt to built
awareness and instigate dialogue between various disciplines in developing ethical standards
regarding research on computer science. Further, it is understood that ethics courses for computing
has been aimed to raise ability of future professionals to solve and recognize different ethical
problems, perspectives and pluralism. Thus they create habit and skills to think rationally about
ethical issues and prepare students for various challenges in their profession. Thus the above report
is encouraging for researchers for understanding various ethical norms in computing. This study has
identified problems that have been relating to different types computer ethics with reference to
accessibility, property, privacy along accuracy. It has also investigated various root causes and
suggested various proposals about those problems. This is done with the help of various ICT
practitioners. However, it must be reminded that application of code of ethics has not yielded the
clear-cut solution for ethical problems. This is because various principles in the code flight have
been conflicting. Here, for example, the principles of confidentiality and honesty can conflict as the
professionals are questioned regarding various technical details for the forthcoming product of
employees.
9. Conclusion:
The researches in computing have been somewhere isolated from the world through
keyboard and screens. However, here theubiquity of computing in the current scenario has
demanded the fact that the responsibility towards thesociety must come into that position. The
above study helps in understanding that consummation of this assimilation between ethics and
computing cannot take place all of a sudden. It would take more years to come into reality. It is not a
static and single vent. It is a dynamic process evolving with the rise of technological experience and
knowledge. In the above paper, steps towards that direction are analyzed in an attempt to built
awareness and instigate dialogue between various disciplines in developing ethical standards
regarding research on computer science. Further, it is understood that ethics courses for computing
has been aimed to raise ability of future professionals to solve and recognize different ethical
problems, perspectives and pluralism. Thus they create habit and skills to think rationally about
ethical issues and prepare students for various challenges in their profession. Thus the above report
is encouraging for researchers for understanding various ethical norms in computing. This study has
identified problems that have been relating to different types computer ethics with reference to
accessibility, property, privacy along accuracy. It has also investigated various root causes and
suggested various proposals about those problems. This is done with the help of various ICT
practitioners. However, it must be reminded that application of code of ethics has not yielded the
clear-cut solution for ethical problems. This is because various principles in the code flight have
been conflicting. Here, for example, the principles of confidentiality and honesty can conflict as the
professionals are questioned regarding various technical details for the forthcoming product of
employees.
18RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
10. Appendix:
Figure 2: “Software Engineering Code of Ethics”
(Source: Computer.org, 2018)
10. Appendix:
Figure 2: “Software Engineering Code of Ethics”
(Source: Computer.org, 2018)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
Figure 3: “Ethics and technology”
(Source: Infosectoday.com, 2018)
Figure 3: “Ethics and technology”
(Source: Infosectoday.com, 2018)
20RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING
11. References:
Blažun Vošner, H., Železnik, D., Kokol, P., Vošner, J. and Završnik, J., 2017. Trends in nursing
ethics research: Mapping the literature production. Nursing ethics, 24(8), pp.892-907.
Bryman, A. and Bell, E., 2015. Business research methods. Oxford University Press, USA.
Computer.org. (2018). Software Engineering Code of Ethics • IEEE Computer Society. [online]
Available at: https://www.computer.org/web/education/code-of-ethics [Accessed 30 Apr. 2018].
Eke, D.O., Stahl, B.C. and Fidler, C., 2015. Understanding the relevance of ethics reviews of ICT
research in UK computing departments using dialectical hermeneutics. Journal of Information,
Communication and Ethics in Society, 13(1), pp.28-38.
Fenwick, T., 2016. Social media, professionalism and higher education: a sociomaterial
consideration. Studies in Higher Education, 41(4), pp.664-677.
Gotterbarn, D.W., Bruckman, A., Flick, C., Miller, K. and Wolf, M.J., 2018. ACM code of ethics: a
guide for positive action.
Infosectoday.com. (2018). Introduction to Computer Ethics. [online] Available at:
http://www.infosectoday.com/Articles/Intro_Computer_Ethics.htm [Accessed 30 Apr. 2018].
Iqbal, J. and Beigh, B.M., 2017. Computer Ethics from Obscure to Ubiquitous. International Journal
of Advanced Research in Computer Science, 8(3).
Jefrey, C. ed., 2018. Research on professional responsibility and ethics in accounting. Emerald
Publishing Limited.
11. References:
Blažun Vošner, H., Železnik, D., Kokol, P., Vošner, J. and Završnik, J., 2017. Trends in nursing
ethics research: Mapping the literature production. Nursing ethics, 24(8), pp.892-907.
Bryman, A. and Bell, E., 2015. Business research methods. Oxford University Press, USA.
Computer.org. (2018). Software Engineering Code of Ethics • IEEE Computer Society. [online]
Available at: https://www.computer.org/web/education/code-of-ethics [Accessed 30 Apr. 2018].
Eke, D.O., Stahl, B.C. and Fidler, C., 2015. Understanding the relevance of ethics reviews of ICT
research in UK computing departments using dialectical hermeneutics. Journal of Information,
Communication and Ethics in Society, 13(1), pp.28-38.
Fenwick, T., 2016. Social media, professionalism and higher education: a sociomaterial
consideration. Studies in Higher Education, 41(4), pp.664-677.
Gotterbarn, D.W., Bruckman, A., Flick, C., Miller, K. and Wolf, M.J., 2018. ACM code of ethics: a
guide for positive action.
Infosectoday.com. (2018). Introduction to Computer Ethics. [online] Available at:
http://www.infosectoday.com/Articles/Intro_Computer_Ethics.htm [Accessed 30 Apr. 2018].
Iqbal, J. and Beigh, B.M., 2017. Computer Ethics from Obscure to Ubiquitous. International Journal
of Advanced Research in Computer Science, 8(3).
Jefrey, C. ed., 2018. Research on professional responsibility and ethics in accounting. Emerald
Publishing Limited.
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.