Wednesday, May 6, 2020

British Computing Society Code of Conduct

Question: Discuss about the British Computing Society Code of Conduct. Answer: During the past years and present time, the function of the British Computer Society (BCS) has become significant. Such that for all the individuals to take up a line of work as ICT (information communication technology) and IS (information systems) workers, the codes of practice and ethic has to be foundation of transporting their obligations. Though, seriously looking at the codes of practice and ethics which centers upon the (public interest, obligation to the manager and customers, obligation to the job and professional ability and reliability) with practices of some people in the job who were imaginary to be bound by the codes of practice and ethics, one would wonder if these codes of practice and ethics were just for the books (The British Computer Society, 2004). The Code of Conduct: Set out the specialized principles which were required by BCS as a preliminary requirement for attaining membership by an individual; Applies to all the individuals, irrespective of their association grade, the function they fulfill and perform, or the jurisdiction where they were working or discharge their contractual duties. Governs the behavior of the person and not the character of the trade in which he works or principles of any Relevant Authority for which a IT professional like me was working and carrying out his task. Employees were anticipated to work out their own judgment (which should be made in such a manner as to be practically acceptable) in order to meet the necessities of the code and seek advice if an individual have any kind of doubt. Similarly, there have been a number of issues which have been face by all the experts in this field. There have been a major number of ethical, social and lawful issues which have been observed to have been taken place at an immense scale. The working of such kind of experts affect the lives of others as they typically obtain as a part of their official training different classes which deal with the ethical issues which were common to their experts (Relkin, 2006). Ethical Issues As, it has been well understood by all the individuals that ethical issues have been regarded as a circumstance that needs an individual or association to decide among options that must be assessed as right i.e. ethical or wrong i.e. unethical (Hack, 2016). The major ethical challenges facing by information technology are security, privacy and copy right infringement. Under the BCS institute ethical issues may include Public Interest. So, being a IT professional it is my duty to: Carry out things with precautions and carry out a thing which would be for the benefit for the heath of people and its surroundings. Perform a task by keeping in mind that the privileges of an individual were not affected. Treat all the individuals in an equal manner irrespective of any caste, sex, gender, etc. Also allow people to use the IT services in a well reputed manner (Berzai, 2012). So, it has been my duty to act for the welfare of the public and not for my personal interest. Also, at the same time I have a obligation to abide by the codes. A computer misuse act makes use of computer for unlawful actions. In todays digitalized world, individuals were spending a momentous part of their lives at job with the internet. So, in IT profession the probability of misutilization of computer has slowly improved. By sharing login details to the friends, copying contravention material like music, movies concluded in misutilization On the other hand, in IT profession illegal Hacking was also one of the crucial crimes where unlawful Hackers utilize their unlawful admittance for critical aims without the privileges from the superior authorities. Introduction of this Computer misuse act 1990 in the field of IT decreased the risk factor of unlawful access, every persons private computer lawfully were safeguarded from any unlawful hackers under the criminal law. Sosial Issues A social issue has been regarded as an issue that pressures a substantial number of the persons within a community. It was often the outcome of features extending beyond the social issue of a person which was the source of a incompatible view on the grounds of what was supposed as a honorably just private life (Gotterban, 2001). Under the BCS institute, I being an IT professional could get rid of such issues by way of specialized capability and honesty. So, being an IT professional I should should: Take and carry out such work for which he was capable and have skill and expertise. Not ask for any kind of ability which was not obtained by an individual in this field. Enlarge his skill and expertise with widening his knowledge scope with observing the things which were going on in this dynamic world and should change with that. Ensure that he has the awareness and have knowledge of the regulations in carrying out his specialized tasks, etc (Stanford Encyclopedia of Philosophy, 2012). For example, Green issues was one of the important disputes in todays world which people face presently to gain acquaintance and plays a important function in IT industry . By way of Green IT, a number of ecological effects in the world were caused such as the utilization of printer; the comprehensive paper utilization has tripled in the last three decades as a result of which deforestation occurred (Shinder, 2005). Harmful impacts have taken place by the inappropriate computer and e-waste recycling as a result of which the health of the public was hampered because it includes Polybrominated Flame Retardants and Barium. While recycling the parts of computer there was no assured privacy for the personal information. Deleting all the files does not essentially delete all the files. So, it was protected to over written the hard disk. Also, Green issues have been taken in to consideration in the IT industry for better community. IT also plays a crucial role in this modern time. Everything has become online and commercial but all these amenities were not available to all the individuals. Without access to IT, disabled people were not capable to live life as normal human beings. So, some software products were designed that could be utilized by the users with a wide range of disabilities and abilities was known as Universal design". Speech and hearing chaos alone not hinder with the utilization of computer (Bloom, 2014). Legal Isues Legal issues have been universally includes the examination for defamatory or false declarations before the copy goes to print. This was an particularly significant step to make sure that publishers dont obligate libel by producing imprecise or fallacious facts or declarations about individuals or actions (Duquenoy, 2016). The British Computer Society (BCS) might have observed to set the standard as a guide for all the individuals who want to be in the occupation and would require to work and practice in the state and even members that would require to work outsides it coast would also be abided by the codes of practice and ethics (Tech ICT, 2016). Conversely, when it comes to concrete situation of a workplace then there were a lot of divergences which would be seen from the codes of practice and ethics with immaterial reasons or shifting of blames (Kerber, 2016). Therefore, under the BCS code and the institute which governs such code the legal issue could be of two types. Duty to Relevant Authority: Under this, it could be stated that it was the obligation which was granted to me that I should: Do the work with compliance, and due care and regard with the rules which the authorities have made. Not carry out any work by which a disagreement takes place between the IT expert and the authority governing it. Not disclose any secret and important data of an individual or of the corporation to any other party for the benefit of oneself, etc (The British Computer Society, 2004). Example: Data protection Act 1998 was the law in UK that needs all the corporations to keep protected any private and secret information that it might hold about the people. In todays time, protection of information has become one of the main problems with the enlarging technology in IT world. With the accessible new technologies in the market Unlawful hacking, privacy, cybercrime could be observed often in all the professions (Warren, 2016). So, at the end it could be concluded that after analyzing the issues which form a part of my job it could be stated that most of the crimes were seen to be taking place as a result of fundamental probabilities in the system which vestiges unnoticed due to lack of knowledge (The British Computer Society, 2016). As a consequence of such issues, all the PC pertinent harms could not be disinfected. So, by pertaining hot joins and scraps these anxieties which were made regarding protections could be enclosed .Privacy could be remembered by abiding by not giving out the passwords to friends. A complicated interruption anticipation scheme in place would hamper a number of trespassers and protects the system and network. It could be recommended that if a recurrent auditing in the IT infrastructure and review could take place it would assist in scheduling and implementing the systems of the security. So, accordingly it could be stated that the finest thing was to be in stroke with computer experts and amalgamation in regard to their societies. Individuals were regarded as the fundamental building slabs of the community. So the verdict making issue should initiate from the essence of the entire computer client. A center on the data system malfunction and study on them could put light on the principles of the computer industry. So, if the societies were doing good then it would be for sure make a high-quality force in the advancement of a good state and in turn a good globe could lead to a better world. To conquer this an individual should esteem the privacy of other individual, the utilization of any software should not hamper any other individual and end-users who should be willing to pay the closed source applications and supply for sharewares .If an individual come across any inconsistency utilization of the internal sense to delight in the requirement to keep the lawful individual who was conversant about the issue. Workers should abide to the guiding principles of the organizations. Therefore, to get rid of such issues sincerity and honesty should be adopted. References Berzai, L. (2012) Ethical Problems in Computing. [Online]Association of Information Technology Professionals. Available from: https://www.aitp.org/news/98451/ [Accessed on 22/12/16] Bloom, E. (2014) 12 Characteristics of Successful IT Professionals. [Online] Chief Information Officers. Available from: https://www.cio.com/article/2375264/careers-staffing/12-characteristics-of-successful-it-professionals.html?page=2 [Accessed on 22/12/16] Duquenoy, P. (2016) Ethical Implications of ICT for Professional Bodies. [Online]Middlesex University. Available from: https://cepis.org/media/EthicsMC.Duquenoy1.pdf [Accessed on 22/12/16] Gotterban, D. (2001) Science and Engineering Ethics. Information and Professional Responsibility. [Online] Available from: https://www.ccsr.cse.dmu.ac.uk/jpapers/papers/Gotterbarn_2001_see.pdf [Accessed on 22/12/16] Hack, M. (2016) How to solve the biggest issues facing IT professionals in 2016. [Online]IT Pro Portal. Available from: https://www.itproportal.com/2016/01/07/how-to-solve-the-biggest-issues-facing-it-professionals-in-2016/ [Accessed on 22/12/16] Kerber, M. (2016) Professionalism BCS Codes .[Online] Computer Science. Available from: https://www.cs.bham.ac.uk/~mmk/teaching/commskills/s4.pdf [Accessed on 22/12/16] Marholis, D. (2016) 7 Characteristics of Successful IT Professionals. [Online]Comp TIA. Available from: https://certification.comptia.org/it-career-news/post/view/2016/10/24/7-characteristics-of-successful-it-professionals [Accessed on 22/12/16] Relkin, J. (2006) 10 ethical issues confronting IT managers. [Online] Tech Republic. Available from: https://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/ [Accessed on 22/12/16] Shinder, D. (2005) Ethical Issues for IT Security Professionals. [Online] Window Security.Available from: https://www.windowsecurity.com/articles-tutorials/misc_network_security/Ethical-Issues-IT-Security-Professionals.html [Accessed on 22/12/16] Shinder, D. (2005) Ethical issues for IT security professionals. [Online] Computer World. Available from: https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-professionals.html [Accessed on 22/12/16] Stanford Encyclopedia of Philosophy. (2012) Information Technology and Moral Values. [Online] Stanford Encyclopedia of Philosophy. Available from: https://plato.stanford.edu/entries/it-moral-values/ [Accessed on 22/12/16] Tech ICT. (2016) British Computing Society Code of Conduct. [Online] Tech ICT. Available from: https://www.teach-ict.com/as_a2_ict_new/ocr/A2_G063/336_implications_ict/ethics/miniweb/pg9.htm [Accessed on 22/12/16] The British Computer Society. (2004) Codes of Good Practice. [Online] The British Computer Society Available from: https://www.bcs.org//upload/pdf/cop.pdf [Accessed on 22/12/16] The British Computer Society. (2016) BCS Code of Conduct. [Online] The British Computer Society. Available from: https://www.bcs.org/category/6030 [Accessed on 22/12/16] The British Computer Society. (2016) British Computer Society Code of Conduct. [Online] The British Computer Society. Available from: https://cgi.csc.liv.ac.uk/~comp39x/2015-16/guides/BCS_CoC.pdf [Accessed on 22/12/16] Warren, E. (2016) Legal, Ethical, and Professional Issues in Information Security. [Online] Cengage. Available from: https://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf [Accessed on 22/12/16]

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.