GE6107 - Ethics (BSIT and BSCS Only)
He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that Shakespeare outranked push-pins.
He believed no one would knowingly operate against their best interests, and those that did were clearly ignorant of what their best interests were.
Jeremy Bentham's advice on pursuing pleasure is called ______________.
He is the father of utilitarianism.
It includes things such as decorative clothing, exotic foods, etc.
It breaks down even further into two subcategories: necessary (food, sleep, etc.) and unnecessary (sexual desires, etc.)
He is concerned that a utilitarian might actually conclude that a game of push-pin really was better than poetry.
It argues that every act is motivated by self-interest. Humanity doesn’t have a choice – we simply operate this way.
It is a theory of moral philosophy that is based on the principle that an action is morally right if it produces a greater quantity of good or happiness than any other possible action.
In what year did Board of Directors approve “IEEE Code of Ethics for Engineers”?
Software engineers shall act consistently with the ______________ interest.
In what year did the Board fo Directors approve the revision to the IEEE Code of Ethic?
Orientation that focuses more on an abstract core of ideals such as respect and responsibility
Orientation that requires that employees identify with and commit to specified conduct.
It is a program that creates the firm's ethical climate and helps ensure that all employees understand the organization's values and comply with the policies and codes of conduct.
Software engineers shall ensure that their __________ and related modifications meet the highest professional standards possible.
This represents employee ethics with formal statements that describe what an organization expects of its employees.
In what year did IEEE endorse “Canons of Ethics of Engineers” after AIEE/IRE merger?
Corporate or business ethics with the most comprehensive document and consists of general statements that serve as principles and the basis for the rules of conduct.
This serves the general public and addresses stakeholder interests.
Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance.
These are formal statements of what an organization expects in the way of ethical behavior.
He is a psychological egoist – believing that egoism is merely a biological fact.
In what year did the Board of Directors approve the simplified IEEE Code of Ethics?
Software engineers shall act in a manner that is in the best interests of their _________ consistent with the public interest.
He claimed that no act should be undertaken except for the pleasure which results, and no act should be rejected but for the pain it produces.
This theory asserts that the empirical consequences of any given act have nothing to do with the moral worth of the act.
May be centralized (perhaps temporarily) so that top level managers can ensure that ethical decisions are made.
It argues that every act ought to be motivated by self-interest. It concludes that acting in self-interest is the best motivator.
Software engineers shall maintain integrity and independence in their professional __________.
In what year was IEEE Code of Ethics adopted by the American Institute of Electrical Engineers (AIEE)?
These are principles that govern the behaviour of a person or group in a business environment.
A method wherein an organization reviews how well it is meeting its new goals for the upcoming year.
Ethics training must increase the percentage of employees reporting incidents of misconduct.
A step in implementing a Code where copies of the code are made available to business partners including suppliers and customers and expect their compliance.
A key area in code of ethics that is the process by which the code is issued and a means to obtain advice on potential breaches.
A step in implementing a Code of Ethics wherein employees and others need to be aware of the consequences of breaching the code.
This is one way which an organization can demonstrate its values in action and to make a positive connection with its stakeholders. This is demonstrated by socially responsible activities towards the community.
A statement that highlights an organization's key ethical issues and identifies the outstretching values and principles that are important to the organization and its decision making.
This one provides an organization with vision and leadership in the area of business conduct.
One of the responsibilities of a compliance officer is to suggest contents for the code of ethics for approval of a higher official.
Anything you post online via social networks is temporary. You may delete it at any time and any traces will be removed completely from the website.
Feedback
This can be defined as the application of classical ethical principles to the use of computer technology.
Feedback
The daily responsibilities of the administrator such as monitoring the system, managing users and passwords, allocating system resources and installations.
Feedback
They are responsible for finding vulnerabilities. They also have their own set of moral issues to address when reversing engineering products for the protection purposes of discovering vulnerabilities.
Feedback
The process of broadly disseminating as much information as possible regarding product or system vulnerabilities so that potential victims possess the same information as the potential hackers.
Feedback
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately, sometimes it is necessary in order to meet aggressive time constraints.
Feedback
A crucial process for determining system integrity and business practice integrity.
Feedback
This involves controlling an integrated computer system and maximizing performance and productivity of that system.
Feedback
They possess great power in the corporate world. They have the ability to spy on fellow employees as they can see the websites employees are visiting, monitor employee emails and online chats, view data on personal computers connected to the corporate network and much more.
Feedback
Having this policy within a company means that whomever signs the nondisclosure agreement agrees to keep the vulnerability information within that organization tightly contained so that no one outside of the organization, especially the general public, ever learns of the existence of product vulnerabilities.
Feedback
When a patch is not aptly tested, problems arise.
Feedback
Disclosing referral fees to the client is up to the executive's decision.