Monday, 19 December 2011

UP,CLOSE AND PERSONAL: IT INDUSTRY TALK




It was on the 21st October when Uniten hosted IT Industry: Up, Close and Personal career talk at DK1 in the afternoon. The main purpose was to expose the students to the reality and the demand of the industry. The speakers were from three (3) different companies being HP, Time Engineering and Internet now. And these companies were represented by Mr.Ilyas Sapiyan, Mr.Vernon Wong and Mr.Devanandan Batumalai, companies being Internet now, Time Engineeting and HP respectively.

The first speaker being Mr.Ilyas Sapiyan whose presentation was titled “What they don’t teach you in College” broke the ice by highlighting that it’s not enough if you do not have soft skills. He said it’s one of the areas many fresh graduates do lack. Also, he shared his experience on writing a good resume that allows puts you ahead of others. Moreover, he offered tips on developing software and said that students should be brave and bold enough to face the industry. It’s not for the faint hearted, because we will

have to deal with people, people with different attitudes and ways of doing things. It was his inspiration also that stood out, when he said we have to take challenges as lessons learnt, apply them and be cautious as we move on our daily basis.

The second person to take the podium was Time Engineering. Her talk was focused on the difference between working life and student life. It’s where she said that attitude of self-development and willing to learn and take extra step is the key to succeed. Which is quite true because the environment is different and can be radical when you are supposed to work long hours. Change is important to accommodate new beginnings and curiosity will open your eyes as you take it to another level. She detailed few careers that exists in IT and summed up by sharing IT industry characteristics.


And lastly, HP representative Mr. Devanandan Palmer Batumalai took over. He emphasized on the company’s history, how it developed. This was made fabulous because his presentation was lively as it included videos. In the videos, we were able to relate and connect as he talked about the business development and what gives them a competitive hand among other competitors. And to bring his curtain down, they gave few presents to those who answered questions.

All in all, it was a very beneficial session, where a lot was shared in a short time. It’s a very massive knowledge which we as students need to have because, sometimes were clouded by our studies and tend to forget to open another eye to see the demand of our industry. OS being reminded was important. It won’t be enough if we will be lacking some soft skills like they said; companies need people who are well grounded.


Thursday, 10 November 2011

Group 1: WEEK 8 – Additional Assignment for CISB412

Question 1:

According to Social Contact Theory, “Morality consists in the set of rules governing how people treat each”, so we believe it’s unethical for this to be happening. It’s wrong, morally unacceptable for someone to secretly photograph other members with those small phones. This will be violating their privacy, because we do not know what purpose are those images going to be used, no matter what reason, they should be photographed with their permission. It continues to state that “rational people will agree to accept for their mutual benefit, on the condition that others will follow”. These statements back up, and in this case, rational people will agree, no one wants to be photographed, and these benefit all. So we believe that as much as everyone has the right of privacy, it should not be invaded, no one has that duty. One has the right to have their cell phones, but not to film or photograph others in the Health Club. So to deal with this issue, the Health Club can make rules that when members go in their changing room, phones are not allowed, these should be stated in the contract and the customers have to adhere to it by agreeing in the contract.

Question 2:

Pros of Criminal background check on the candidate

1: Reduce theft and embezzlement: this helps to know the person you are hiring. It’s difficult to trust people with what they just tell you about themselves. So knowing their background can increase confidence level. You do not want to hire a thief who will bring your company down or destroy your reputation.

2: Check for potential discipline problems: This type of information is particularly hard to get from past employers due to fear of defamation lawsuits. Most employers want to know this type of information about potential employees as it has a bearing on employee success and organizational liability.

3: Discourage applicants who have something to hide.

4: Decrease workplace violence

Cons of Criminal background check on the candidate

1: Inaccuracies such as mistaken identity may affect the judgment and outcome of the results and thus losing a quality candidate.

2: Time can be wasted in checking for the record, as others take a longer time to release them.

3: Some people can be painted with a brush of a certain crime, not that they

So we analyses thus scenario based on Kantianism, where we believe that these is ethical. Knowing the background is more beneficial. If you are not clean, it might bring some goose bumps to you, and if you have a clean background, why would you like to hide anything. No one would like to be seen as a bad person. Even bad people they like to be seen as good people. With the first formulation, when we universalize it, the moral rule will act at the same time for the universal moral rules. It will not cause harm rather good when we know who were working with, whom am I choosing to be my secretary. The second also, we will not be using anyone to benefit ourselves. Its just be aware of the situation. In fact when they hide their criminal record they will be using us to benefit themselves, it will be wrong to hire an abuser to take care of your children as your maid.

Question 3:

Copyright:

Copyright is a form of protection provided to the authors of “original works” and includes such things as literary, dramatic, musical, artistic, and certain other intellectual creations, both published and unpublished.

Examples of copyright:

Ø Copyright © 1999 – 2008 Google

Ø Copyright © 2007 Discovery Communications Inc.

Patent:

A form of protection that provides a person or legal entity with exclusive rights for making, using or selling a concept or invention and excludes others from doing the same for the duration of the patent.

For example: special features that the phone cell companies nowadays try to gain them to be distinguished from the rest.

Trademark

A trademark is a word, symbol, or phrase, used to identify a particular manufacturer or seller's products and distinguish them from the products of another. It is a critical form of intellectual property that needs to be protected.

In essence it is a badge of origin that allows customers to distinguish the goods or services of one trader from those of another. In order to be registrar a trade mark must be:

• Distinctive for the goods or services in relation to which it is/will be used (i.e. it must not be exclusively descriptive of the kind, quality, quantity, intended purpose, value, geographical origin, or other characteristics of the goods or services)
• Not be generic or reasonably required for use in the relevant trade
• Not be deceptive, misleading, contrary to law or morality, or filed in bad faith
• Not identical or confusingly similar to any earlier marks for the same or similar goods/services

It is important that we not that a trademark does not expire, it can just be lost if it becomes common noun. For it to be declared a trade mark it should be registered with agencies and companies and individuals who have registered a trademark will pursue many legal avenues to protect it.

Trade Secret

Trade secrets are information that companies keep secret to give them an advantage over their competitors. The formula for Coca-Cola is the most famous trade secret.

Question 4:

When we analyze this issue with act utilitarianism, we sum up that it’s wrong to duplicate software’s. This is because it decreases the total happiness of the developers. It has lot of consequences that happiness. In fact software duplication is a crime in most countries which is punishable harshly. Duplication of software kills the industry; they won’t be making more profit like when they are sold well. Of course, some will be happy that they are getting free, but we know that duplicated software’s most times they are not stable, there have their own bugs, and they have security issues. These have the potential to destroy the reputation of the developers, people start to think they are not good, while the fact is that they bought or got low quality work. These will further reduce the completion level among the developers, as there is no motivation to be at the top. They don’t have any patent to keep. I

Monday, 31 October 2011

IMPORTANCE OF ETHICS IN INFORMATION TECHNOLOGY


Abstract:
The rapid development in information technology communication has created a wave which has to be noticed. It would not be enough if we are to look at the benefits and empowerment we get from our digital tools, these have been evidenced by the problems and challenges they have posed and continue posing to us, our life’s and organizations. Today, they have become our partners in the sense that they help us to make decisions, process massive processes in a short limited time. So their usage and the relationship that they create matters, thus they tend to raise moral concerns; these are because they pose ethical issues when they create new possibilities for human action. New technological possibilities are not always good or purely good; often they have mixed value, so they need to be evaluated.
                                                                    Introduction
The borderless world of information technology has created enormous possibilities for individual and institutional behavior. We could have not reached the moon without computers, nor could we have the kind of global communication systems we now have. Since the early days, computer technology has been far from stagnant, rather frequently developing with each new innovation. These have been made easy by that these new developments made it possible to develop something new. People are no longer satisfied; they are always looking for something new. And these new things do not develop themselves in most cases if not all.
There are Professionals and individuals who are entangled with this work. IT on its own should not be left behind, and fortunate enough, there are some bodies which consider these. Bodies like ACM (Association of Computing Machinery), IEE (Institute of Electrical and Electronics Engineering) and others which have taken it to another level.

These professional in IT should appreciate and see the importance of Ethics in IT before they will even consider it. They will just know about it as “something” that exist and they should remember, but not really applying it, because, there can be much talk but less action; talk is cheap, action is expensive.

Definitions:

Ethics has been defined in many ways by different people depending on their different perspectives, but the goal is to become ethical people, particularly in IT profession. With these different definitions from different angles, we will look at them to set the way for our topic discussion.
A system of accepted beliefs which control behavior, based on moral. It stresses on idealistic standards of right and wrong.
 Cambridge Dictionary Online


 According to James Moor (1985), he suggested that we think of the ethical questions surrounding computer as policy vacuums. Computer and information technology creates innumerable opportunities, and we find a vacuum of policies on how to make these choices. The central task of computer ethics, Moor argues is to determine what we should do and what our policies should be. This includes consideration of both personal and social values. Thus this paper will highlight “The importance of ethics among the Information Technology (IT) professionals. 
In most societies, a system of laws codifies the most significant ethical standards and provides a mechanism for holding people, organizations, and even governments accountable. (Laudon, et al, 1996)
Morf (1999: 265) “Ethics is the moral principle that individuals inject into their decision making process and that helps temper the last outcome to conform to the norms of their society”.

It can be summed up that ethics have to do with social context, moral and legal issues. But these do not mean that IT ethical issues are unique. “There is nothing new under the sun.”, as the old saying says.  These may threaten privacy, but privacy issues have been around for ages, and they have centered on new technologies. With IT, it allows us to challenge our traditional conception, ideas, thoughts and our system of accountability because it allows us to do many things remotely and remain unknown, making it difficult or diffusing information our sense of responsibility for the effects of our actions.
This paper increases the ability of IT professional to first recognize and then responsibly confront moral issues raised by technological activity, and the importance of ethics in IT profession:
Ethics are often very subjective, and connected to our emotions and our basic sense of ‘right’ and ‘wrong’. This means that it can be difficult to define ethics rigorously. There are great varieties of ethical issues that need to be considered in IT.






Ethical Issues in IT:
Information Technology is the scientific, technological and engineering disciplines and the management techniques used in information handling and processing; their applications; computers and their interaction with men and machines; and associated social, economic and cultural matters” (British Advisory Council for Applied Research and Development, 1980).
IT does not only involve technological aspects, but also the main component of information which represents data, information, and knowledge. IT assists and extends the ability of human to capture, process, store, understand, use, and spread information at a speed and scale which had never been thought possible in previous time. Some of the impact and changes of IT are obvious, but many are subtle. Thus and through all these expansion, Ethics helps to safeguard the assets of the organization and also individuals. In a workplace where individuals work without guidelines and regulations controlling them, there is a tendency for a lapse, a loop hole will be created which can in turn be used to manipulate others or the assets of the company. So, if in a given environment, professional are kept aware, not only aware but also practice it, the environment will be conducive to a certain extent.

Ethics is necessary in the sense that there is a vacuum which has been created by new evolutions. These has been emphasized by James Moor (1985), he suggested that we think as ethical questions as questions surrounding computer and information technology as policy vacuums.  Computer and information technology creates innumerable opportunities. This means that we are comforted with choices about whether and how to pursue these opportunities, and we find a vacuum of policies on how to make these choices. The central task of computer ethics, Moor argues, is to determine what we should do and what our policies should be. These include both personal and social ethics.
These is also clear, when in the past, less people took seriously the keeping and security of data. It was just placed there and few only cared about them. Now these are the same files that contain the whole life and details of people. It’s their money inside, their privacy, every that concerns them and they are confidential. Any access to them might either cost them loss of jobs, life and even can declare them to be bankrupt.
With the invisibility factor that Information technology possesses, it is vital for ethics to be considered. .
Most of the time and under most conditions computer operations are invisible. And some individuals are made to think they are being helped rather they are being scammed. Dr. Moor touched on the invisibility factor of computer technology. The invisibility factor is essentially the fact that computer operations themselves are largely invisible. “One may be quite knowledgeable about the inputs and outputs of a computer and only dimly aware of the internal processing (Moor J, 1985).” In regards to ethics, the invisibility factor increases the difficulty of establishing computer policies, due to the fact that many actions in computing are hidden. As an example, Dr. Moor elaborates on a case in which a programmer wrote software that would steal fractional interest from multiple bank accounts and transfer the funds to another account. In such case, the obvious computer fraud would largely go unnoticed because of the hidden nature of this fraud. While this example is a classic example of stealing, there may be other cases of invisibility factor that may or may not be considered ethical. For example, as Dr. Moor states, the American Airlines’ reservation system –SABRE was built in such way that it would favor their (AA’s) flights over their competitions’ flights. Is the use of such system ethical? Were the AA representatives aware this “feature”? Was such feature intentional or was this simply a programming “bug”? It is difficult to answer these questions, which is precisely why realizing the existence of the invisible factor is so important.
Types of ethical issues in IT:
There are a great variety of ethical issues in IT that need to be considered, and we will consider some of the different types of it in this section:
Hacking
Hacking is to illegally access a protected system. Hackers break into a system for a variety of reasons, Hacking can be undertaken in such as the wish to understand how a system works or the wish to damage a system or to steel information etc. Such as breaking into a banking system and transferring money from anyone’s account to the illegal beneficiary’s account.  Alternatively, there might be a desire to alert people to the fact that a system is insecure and needs improving. Due to this some argue that there are ‘hacker ethics’. A hacker says that: "The ethics behind hacking and the actions taken by hackers constitute a philosophical manifesto that transcends our understanding of the art" (, und. p.1). Hacking can present a moral dilemma. This is because they sometimes offer their expertise to help to protect organizations against other hackers. Hackers cannot just wander into a system, as they could into an unlocked door. Instead, it requires a lot of skill. With this skill hackers can demonstrate that a system is insecure and needs improving. In this way, it could be argued that hackers play a valuable role. However, many hackers argue that hacking might lead to some improvements, but that it causes such a lot of disruption that it is not worth it in the long-run.
Data Errors
Entry of data into the databases is prone to human and device error. Complacency, negligence or a system error during the process of data entry for individuals or companies often leads to serious mistakes that may cause a lot of problems and losses for the individuals or companies such as financial losses through wrong calculation or entry of tax amount etc.

Data Theft
Data theft is another very big ethical issue these days among IT professionals. The IT professionals by virtue of their profession have access to a lot of private and secret information such as credit card details, social security details, bank account details and their passwords etc. They may use these unethically and illegally to transfer money, or to do shopping or pay their own bills. Time and again cases of data theft keep on surfacing in the IT world; to solve these problems we need a comprehensive international law against unethical behavior of IT professionals and individuals, training of IT professionals in ethics, monitoring and investment & research on developing more secure systems.
Conclusion
The growing importance of technological gargets in modern era makes Ethics an important and essential when it comes to issues related to the Information Technology profession such as safety, security, privacy and everyday usage of computers which give rise to numerous ethical dilemmas.
The goal of ethics should not be only focused on the professionals; even aspiring individuals in universities should be enlightened about it. These will increase the ability of future professionals to recognize and solve ethical problems they might face. to accept different ethical perspectives. It will also develop that skill and habit in them of thinking rationally about ethical issues.
To sum up, ethics is very important in many ways, it’s a direction to individuals and a roadmap which is beneficial for IT professional and the organization.
References:
[1] Moor, J. H. (1985). “What is Computer Ethics?” Metaphilosophy, 16/4: 266–75.
      Laudon, K.C., Traver, C.G. and Laudon J.P. 1996. Information Technology and Society, pp.513.

[2] Morf, Duffy A., Schumacher, Michael G., and Vitell, Scott J.: “A Survey of Ethics Officers in         Large Organizations”, Journal of Business Ethics 20, 265-271: 1999.

[3] Ladd, J., 1991, The quest for a Code of Professional Ethics: an intellectual and moral confusion, Ethical Issues in Engineering, Ed. Deborah G. Johnson. Englewood Cliffs, NJ: Prentice-Hall, 130-136.

[4]Steven Mintz 2010, What is ethics?

Retrieved Oct 15, 2011 from http://www.ethicssage.com/2010/12/what-is-ethics.html

[5]James H. Moor, What is Computer Ethics?

Retrieved Oct 15, 2011 from: http://www.cs.ucdavis.edu/~rogaway/classes/188/spring06/papers/moor.html
[6] Moor, J., 2004, Towards a Theory of Privacy in the Information Age. Computer Ethics and Professional Responsibility. Edited by Terrell W Bynum and S Rogerson. Blackwell Publishing
[7] http://www.computer.org/education/cc2001/index.htm Computing Curricula 2001
[8] http://www.iit.edu/departments/csep/PublicWWW/codes/ Codes of Ethics Online
[9] http://www.asce.org/inside/codeofethics.cfm American Society of Civil Engineers Code of Ethics
[10] http://www.acm.org/constitution/code.html ACM Code of Ethics and Professional Conduct
[11] www.ieee.org/about/whatis/code.html IEEE Code of Ethics
[12] Rikowski, R. (2006) Teaching Ethical Issues in Information Technology: how and when, Information for Social Change, summer, Issue 23: 
http://www.libr.org/isc/issues/ISC23/B9a%20Ruth%20Rikowski.pdf (Teaching Ethical Issues in I.T: how and when)
[13] Tengku Mohd T. Sembok. Ethics of Information Communication Technology (Ict) // Materials of    Regional Meeting on Ethics of Science and Technology: http:/ / www.emeraldinsight.com.





Behind the scenes


ASSIGNMENT 1 PART 1

We have conducted a mini research to discuss the importance of Ethics among the IT professionals. The outcome of this research will be presented in a form of an academic paper and video clip by our selected presenter from our team to deliver a presentation about this paper.

So, our final outcome is:







Thanks to Mr. Kgakgamatso Letsweletse & all the group member that help to finish the part one.

GROUP MEMBER INFORMATIONS

NAME     : MUHAMMAD SYAHHIZAL BIN ABU HASHIM
ID            : IS084519
FROM     : IPOH, PERAK DARUL RIDZUAN, MALAYSIA.
COURSE : BACHELOR IN IT (INFORMATION SYSTEM) (Hons.)

ABOUT ME :

Ambitious, always looking forward, bold and bit stubborn. Laziness is my enemy.

Wednesday, 26 October 2011








NAME: AL-GHAMDI, FAHAD

ID:IS084513

FROM:SAUDI ARABIA

COURSE: Bachelor of Information Technology (Information System)(Hons.)

Thursday, 20 October 2011




Name: Abdulqader Bahamid

From: Yemen

ID: SN084869

Course: Bachelor student in Computer Science (Systems and Networking) (Hons.)

Saturday, 15 October 2011


Name: Maryam Adinehnia



Student-ID: IS085931



From: Iran



Course: Bachelor of Information Technology (Information System)(Hons.)

Friday, 14 October 2011


Name: Ehsan Ahanchian

D.O.B: 28 Aug 1983

From: IRAN

ID: SN084657

Course: Bachelor student in Computer Science (Systems and Networking) (Hons.)

Goal: Get acknowledgment of computer science as much as I can and finish my study that I started very late.