104
COMP 516 Research Methods in Computer Science Dominik Wojtczak Department of Computer Science University of Liverpool 1 / 104

COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

COMP 516Research Methods in Computer Science

Dominik Wojtczak

Department of Computer ScienceUniversity of Liverpool

1 / 104

Page 2: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

COMP 516Research Methods in Computer Science

Lecture 19: Legal, Social, Ethical and Professional Issues (2)

Dominik Wojtczak

Department of Computer ScienceUniversity of Liverpool

with material from Ullrich Hustadt and Rahul Savani

2 / 104

Page 3: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professions: Characteristics

Substantial education and / or training are required in order topractise a profession

The members of a profession themselves decide the nature of thiseducation and training

The members of a profession sometimes also control entry to theprofession

A profession is typically organised into one or more professionalbodies

A profession lays down standards of conduct with which itsmembers must comply

3 / 104

Page 4: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Bodies in Computing

Institute of Electrical and Electronic Engineers Computer Society(IEEE-CS) founded in 1946 in the USA “world’s leading computing membership organization and

the trusted information and career-development sourcefor a global workforce of technology leaders”

Association for Computing Machinery (ACM)founded in 1947 in the USA “world’s largest educational and scientific computing society,

uniting educators, researchers and professionals”

BCS (British Computer Society), The Chartered Institute for IT,formed in 1957; received a royal charter in 1984

Recognised as a professional engineering institute for the registration ofinformation systems and software engineers

One of the licensed institutions of the Engineering Council,itself formed in 1982

4 / 104

Page 5: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Bodies in Computing

Institute of Electrical and Electronic Engineers Computer Society(IEEE-CS) founded in 1946 in the USA “world’s leading computing membership organization and

the trusted information and career-development sourcefor a global workforce of technology leaders”

Association for Computing Machinery (ACM)founded in 1947 in the USA “world’s largest educational and scientific computing society,

uniting educators, researchers and professionals”

BCS (British Computer Society), The Chartered Institute for IT,formed in 1957; received a royal charter in 1984

Recognised as a professional engineering institute for the registration ofinformation systems and software engineers

One of the licensed institutions of the Engineering Council,itself formed in 1982

5 / 104

Page 6: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Bodies in Computing

Institute of Electrical and Electronic Engineers Computer Society(IEEE-CS) founded in 1946 in the USA “world’s leading computing membership organization and

the trusted information and career-development sourcefor a global workforce of technology leaders”

Association for Computing Machinery (ACM)founded in 1947 in the USA “world’s largest educational and scientific computing society,

uniting educators, researchers and professionals”

BCS (British Computer Society), The Chartered Institute for IT,formed in 1957; received a royal charter in 1984

Recognised as a professional engineering institute for the registration ofinformation systems and software engineers

One of the licensed institutions of the Engineering Council,itself formed in 1982

6 / 104

Page 7: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Bodies in Computing

Institute of Electrical and Electronic Engineers Computer Society(IEEE-CS) founded in 1946 in the USA “world’s leading computing membership organization and

the trusted information and career-development sourcefor a global workforce of technology leaders”

Association for Computing Machinery (ACM)founded in 1947 in the USA “world’s largest educational and scientific computing society,

uniting educators, researchers and professionals”

BCS (British Computer Society), The Chartered Institute for IT,formed in 1957; received a royal charter in 1984

Recognised as a professional engineering institute for the registration ofinformation systems and software engineers

One of the licensed institutions of the Engineering Council,itself formed in 1982

7 / 104

Page 8: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Bodies in Computing

Institute of Electrical and Electronic Engineers Computer Society(IEEE-CS) founded in 1946 in the USA “world’s leading computing membership organization and

the trusted information and career-development sourcefor a global workforce of technology leaders”

Association for Computing Machinery (ACM)founded in 1947 in the USA “world’s largest educational and scientific computing society,

uniting educators, researchers and professionals”

BCS (British Computer Society), The Chartered Institute for IT,formed in 1957; received a royal charter in 1984

Recognised as a professional engineering institute for the registration ofinformation systems and software engineers

One of the licensed institutions of the Engineering Council,itself formed in 1982

8 / 104

Page 9: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

British Computer Society

Chartered Scientist is a professional qualification in the UK, holderscan use the post-nominal letters CSci

the required standard for Chartered Scientist registration is MScqualification (or equivalent) with four years of postgraduate workexperience

To be a Student Member the fee is 30 pounds per year andyou have to be a student on a BCS accredited degree programme

To become a Professional Member (MBCS): 106 pounds per year5 years IT work experience, or

2–3 years IT work experience plus relevant recognised qualifications(depending on level of qualification), or

an Honours degree with BCS exemption9 / 104

Page 10: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

British Computer Society

Chartered Scientist is a professional qualification in the UK, holderscan use the post-nominal letters CSci

the required standard for Chartered Scientist registration is MScqualification (or equivalent) with four years of postgraduate workexperience

To be a Student Member the fee is 30 pounds per year andyou have to be a student on a BCS accredited degree programme

To become a Professional Member (MBCS): 106 pounds per year5 years IT work experience, or

2–3 years IT work experience plus relevant recognised qualifications(depending on level of qualification), or

an Honours degree with BCS exemption10 / 104

Page 11: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

British Computer Society

Chartered Scientist is a professional qualification in the UK, holderscan use the post-nominal letters CSci

the required standard for Chartered Scientist registration is MScqualification (or equivalent) with four years of postgraduate workexperience

To be a Student Member the fee is 30 pounds per year andyou have to be a student on a BCS accredited degree programme

To become a Professional Member (MBCS): 106 pounds per year5 years IT work experience, or

2–3 years IT work experience plus relevant recognised qualifications(depending on level of qualification), or

an Honours degree with BCS exemption11 / 104

Page 12: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Ethics

More restrictive than universal ethics becauseit involves the more restrictive society/culture of work and commerce

it determines right/wrong in cases where a general ethical theorymight not do so

Applies also to other restrictive social contracts such as study

Many flavours of professional ethics exist:medical, engineering, banking, etc

Often associated with formal structureBMA (medicine), IET (engineering), BCS (computing)

Often formally constructed rules and codes of conductHippocratic oath taken by doctors

12 / 104

Page 13: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

13 / 104

Page 14: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

14 / 104

Page 15: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

15 / 104

Page 16: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

16 / 104

Page 17: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

17 / 104

Page 18: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

18 / 104

Page 19: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

19 / 104

Page 20: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

20 / 104

Page 21: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

21 / 104

Page 22: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

22 / 104

Page 23: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

23 / 104

Page 24: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

24 / 104

Page 25: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

The IT Professional Context

Legal obligations

Social obligations

Ownership/sharingobligations

IP obligations

Product developmentprocess obligations

Product quality obligationvalidityrobustnesssimplicitymodifiabilityreusabilitycompatibilityefficiencyease of useportabilityintegrity

Product consequenceobligations

25 / 104

Page 26: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

BCS Code of Conduct

Four component parts:1 Public Interest2 Professional Competence and Integrity3 Duty to Relevant Authority4 Duty to Profession

(http://www.bcs.org/upload/pdf/conduct.pdf)

Contents of the Code of Conduct changes frequently BCS members need to keep up to date with such changes

Code of Conduct is complemented by a Code of Good Practicehttp://www.bcs.org/upload/pdf/cop.pdf

26 / 104

Page 27: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Public Interest

Safeguarding public health and safety

Have due regard for the legitimate rights of third parties

Conduct your professional activities without discrimination

Promote equal access to the benefits of IT

27 / 104

Page 28: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Public Interest

Safeguarding public health and safety

Have due regard for the legitimate rights of third parties

Conduct your professional activities without discrimination

Promote equal access to the benefits of IT

28 / 104

Page 29: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Public Interest

Safeguarding public health and safety

Have due regard for the legitimate rights of third parties

Conduct your professional activities without discrimination

Promote equal access to the benefits of IT

29 / 104

Page 30: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Public Interest

Safeguarding public health and safety

Have due regard for the legitimate rights of third parties

Conduct your professional activities without discrimination

Promote equal access to the benefits of IT

30 / 104

Page 31: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Competence and Integrity

Only undertake work that is within your professional competence

Do not claim any level of competence that you do not possess

Upgrade and maintain knowledge, skills and competenceon a continuing basis

Respect and value alternative viewpoints and, seek, accept andoffer honest criticism of work

Avoid injuring others, their property, reputation, or employmentby false or malicious or negligent action or inaction

Reject and do not make any offer of bribery or unethical inducement

31 / 104

Page 32: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Competence and Integrity

Only undertake work that is within your professional competence

Do not claim any level of competence that you do not possess

Upgrade and maintain knowledge, skills and competenceon a continuing basis

Respect and value alternative viewpoints and, seek, accept andoffer honest criticism of work

Avoid injuring others, their property, reputation, or employmentby false or malicious or negligent action or inaction

Reject and do not make any offer of bribery or unethical inducement

32 / 104

Page 33: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Competence and Integrity

Only undertake work that is within your professional competence

Do not claim any level of competence that you do not possess

Upgrade and maintain knowledge, skills and competenceon a continuing basis

Respect and value alternative viewpoints and, seek, accept andoffer honest criticism of work

Avoid injuring others, their property, reputation, or employmentby false or malicious or negligent action or inaction

Reject and do not make any offer of bribery or unethical inducement

33 / 104

Page 34: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Competence and Integrity

Only undertake work that is within your professional competence

Do not claim any level of competence that you do not possess

Upgrade and maintain knowledge, skills and competenceon a continuing basis

Respect and value alternative viewpoints and, seek, accept andoffer honest criticism of work

Avoid injuring others, their property, reputation, or employmentby false or malicious or negligent action or inaction

Reject and do not make any offer of bribery or unethical inducement

34 / 104

Page 35: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Competence and Integrity

Only undertake work that is within your professional competence

Do not claim any level of competence that you do not possess

Upgrade and maintain knowledge, skills and competenceon a continuing basis

Respect and value alternative viewpoints and, seek, accept andoffer honest criticism of work

Avoid injuring others, their property, reputation, or employmentby false or malicious or negligent action or inaction

Reject and do not make any offer of bribery or unethical inducement

35 / 104

Page 36: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Competence and Integrity

Only undertake work that is within your professional competence

Do not claim any level of competence that you do not possess

Upgrade and maintain knowledge, skills and competenceon a continuing basis

Respect and value alternative viewpoints and, seek, accept andoffer honest criticism of work

Avoid injuring others, their property, reputation, or employmentby false or malicious or negligent action or inaction

Reject and do not make any offer of bribery or unethical inducement

36 / 104

Page 37: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to Relevant Authority

Carry out your professional responsibilities with due care anddilligence in accordance with the Relevant Authority’s requirementswhilst exercising your professional judgement

Avoid any situation that may give rise to a conflict of interestbetween you and your Relevant Authority and clients

Accept professional responsibility for your work and for the work ofcolleagues under your supervision

Respect confidential information

Be honest about products and services and do not take advantageof a lack of knowledge or inexperience of others

37 / 104

Page 38: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to Relevant Authority

Carry out your professional responsibilities with due care anddilligence in accordance with the Relevant Authority’s requirementswhilst exercising your professional judgement

Avoid any situation that may give rise to a conflict of interestbetween you and your Relevant Authority and clients

Accept professional responsibility for your work and for the work ofcolleagues under your supervision

Respect confidential information

Be honest about products and services and do not take advantageof a lack of knowledge or inexperience of others

38 / 104

Page 39: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to Relevant Authority

Carry out your professional responsibilities with due care anddilligence in accordance with the Relevant Authority’s requirementswhilst exercising your professional judgement

Avoid any situation that may give rise to a conflict of interestbetween you and your Relevant Authority and clients

Accept professional responsibility for your work and for the work ofcolleagues under your supervision

Respect confidential information

Be honest about products and services and do not take advantageof a lack of knowledge or inexperience of others

39 / 104

Page 40: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to Relevant Authority

Carry out your professional responsibilities with due care anddilligence in accordance with the Relevant Authority’s requirementswhilst exercising your professional judgement

Avoid any situation that may give rise to a conflict of interestbetween you and your Relevant Authority and clients

Accept professional responsibility for your work and for the work ofcolleagues under your supervision

Respect confidential information

Be honest about products and services and do not take advantageof a lack of knowledge or inexperience of others

40 / 104

Page 41: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to Relevant Authority

Carry out your professional responsibilities with due care anddilligence in accordance with the Relevant Authority’s requirementswhilst exercising your professional judgement

Avoid any situation that may give rise to a conflict of interestbetween you and your Relevant Authority and clients

Accept professional responsibility for your work and for the work ofcolleagues under your supervision

Respect confidential information

Be honest about products and services and do not take advantageof a lack of knowledge or inexperience of others

41 / 104

Page 42: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to the Profession

Accept your personal duty to uphold the reputation of the profession

Seek to improve professional standards through participation in theirdevelopment, use and enforcement

Uphold the reputation and good standing ofBCS, the Chartered Insitute for IT

Act with integrity towards other professionals

Notify BCS if convicted of a criminal offence or becoming bankruptor disqualified as a Company Director

Encourage and support fellow members in their professionaldevelopment

42 / 104

Page 43: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to the Profession

Accept your personal duty to uphold the reputation of the profession

Seek to improve professional standards through participation in theirdevelopment, use and enforcement

Uphold the reputation and good standing ofBCS, the Chartered Insitute for IT

Act with integrity towards other professionals

Notify BCS if convicted of a criminal offence or becoming bankruptor disqualified as a Company Director

Encourage and support fellow members in their professionaldevelopment

43 / 104

Page 44: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to the Profession

Accept your personal duty to uphold the reputation of the profession

Seek to improve professional standards through participation in theirdevelopment, use and enforcement

Uphold the reputation and good standing ofBCS, the Chartered Insitute for IT

Act with integrity towards other professionals

Notify BCS if convicted of a criminal offence or becoming bankruptor disqualified as a Company Director

Encourage and support fellow members in their professionaldevelopment

44 / 104

Page 45: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to the Profession

Accept your personal duty to uphold the reputation of the profession

Seek to improve professional standards through participation in theirdevelopment, use and enforcement

Uphold the reputation and good standing ofBCS, the Chartered Insitute for IT

Act with integrity towards other professionals

Notify BCS if convicted of a criminal offence or becoming bankruptor disqualified as a Company Director

Encourage and support fellow members in their professionaldevelopment

45 / 104

Page 46: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to the Profession

Accept your personal duty to uphold the reputation of the profession

Seek to improve professional standards through participation in theirdevelopment, use and enforcement

Uphold the reputation and good standing ofBCS, the Chartered Insitute for IT

Act with integrity towards other professionals

Notify BCS if convicted of a criminal offence or becoming bankruptor disqualified as a Company Director

Encourage and support fellow members in their professionaldevelopment

46 / 104

Page 47: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Duty to the Profession

Accept your personal duty to uphold the reputation of the profession

Seek to improve professional standards through participation in theirdevelopment, use and enforcement

Uphold the reputation and good standing ofBCS, the Chartered Insitute for IT

Act with integrity towards other professionals

Notify BCS if convicted of a criminal offence or becoming bankruptor disqualified as a Company Director

Encourage and support fellow members in their professionaldevelopment

47 / 104

Page 48: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ACM Code of Conduct

Four component parts:General moral imperatives

Professional responsibilities

Organisational leadership

Compliance with the code

48 / 104

Page 49: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

General Moral Imperatives

Contribute to society and human well-being

Avoid harm to others

Be honest and trustworthy

Be fair and take action not to discriminate

Honor property rights including copyrights and patents

Give proper credit for intellectual property

Respect the privacy of others

Honor confidentiality

49 / 104

Page 50: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

General Moral Imperatives

Contribute to society and human well-being

Avoid harm to others

Be honest and trustworthy

Be fair and take action not to discriminate

Honor property rights including copyrights and patents

Give proper credit for intellectual property

Respect the privacy of others

Honor confidentiality

50 / 104

Page 51: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

General Moral Imperatives

Contribute to society and human well-being

Avoid harm to others

Be honest and trustworthy

Be fair and take action not to discriminate

Honor property rights including copyrights and patents

Give proper credit for intellectual property

Respect the privacy of others

Honor confidentiality

51 / 104

Page 52: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

General Moral Imperatives

Contribute to society and human well-being

Avoid harm to others

Be honest and trustworthy

Be fair and take action not to discriminate

Honor property rights including copyrights and patents

Give proper credit for intellectual property

Respect the privacy of others

Honor confidentiality

52 / 104

Page 53: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

General Moral Imperatives

Contribute to society and human well-being

Avoid harm to others

Be honest and trustworthy

Be fair and take action not to discriminate

Honor property rights including copyrights and patents

Give proper credit for intellectual property

Respect the privacy of others

Honor confidentiality

53 / 104

Page 54: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

General Moral Imperatives

Contribute to society and human well-being

Avoid harm to others

Be honest and trustworthy

Be fair and take action not to discriminate

Honor property rights including copyrights and patents

Give proper credit for intellectual property

Respect the privacy of others

Honor confidentiality

54 / 104

Page 55: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

General Moral Imperatives

Contribute to society and human well-being

Avoid harm to others

Be honest and trustworthy

Be fair and take action not to discriminate

Honor property rights including copyrights and patents

Give proper credit for intellectual property

Respect the privacy of others

Honor confidentiality

55 / 104

Page 56: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

General Moral Imperatives

Contribute to society and human well-being

Avoid harm to others

Be honest and trustworthy

Be fair and take action not to discriminate

Honor property rights including copyrights and patents

Give proper credit for intellectual property

Respect the privacy of others

Honor confidentiality

56 / 104

Page 57: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Responsibilities

Strive to achieve the highest quality, effectiveness and dignity inboth the process and products of professional work

Acquire and maintain professional competence

Know and respect existing laws pertaining to professional work

Accept and provide appropriate professional review

Give comprehensive and thorough evaluation of computer systemsand their impacts, including analysis of possible risks

Honor contracts, agreements, and assigned responsibilities

Improve public understanding of computing and its consequences

Access computing and communication resources only whenauthorised to do so

57 / 104

Page 58: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Responsibilities

Strive to achieve the highest quality, effectiveness and dignity inboth the process and products of professional work

Acquire and maintain professional competence

Know and respect existing laws pertaining to professional work

Accept and provide appropriate professional review

Give comprehensive and thorough evaluation of computer systemsand their impacts, including analysis of possible risks

Honor contracts, agreements, and assigned responsibilities

Improve public understanding of computing and its consequences

Access computing and communication resources only whenauthorised to do so

58 / 104

Page 59: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Responsibilities

Strive to achieve the highest quality, effectiveness and dignity inboth the process and products of professional work

Acquire and maintain professional competence

Know and respect existing laws pertaining to professional work

Accept and provide appropriate professional review

Give comprehensive and thorough evaluation of computer systemsand their impacts, including analysis of possible risks

Honor contracts, agreements, and assigned responsibilities

Improve public understanding of computing and its consequences

Access computing and communication resources only whenauthorised to do so

59 / 104

Page 60: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Responsibilities

Strive to achieve the highest quality, effectiveness and dignity inboth the process and products of professional work

Acquire and maintain professional competence

Know and respect existing laws pertaining to professional work

Accept and provide appropriate professional review

Give comprehensive and thorough evaluation of computer systemsand their impacts, including analysis of possible risks

Honor contracts, agreements, and assigned responsibilities

Improve public understanding of computing and its consequences

Access computing and communication resources only whenauthorised to do so

60 / 104

Page 61: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Responsibilities

Strive to achieve the highest quality, effectiveness and dignity inboth the process and products of professional work

Acquire and maintain professional competence

Know and respect existing laws pertaining to professional work

Accept and provide appropriate professional review

Give comprehensive and thorough evaluation of computer systemsand their impacts, including analysis of possible risks

Honor contracts, agreements, and assigned responsibilities

Improve public understanding of computing and its consequences

Access computing and communication resources only whenauthorised to do so

61 / 104

Page 62: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Responsibilities

Strive to achieve the highest quality, effectiveness and dignity inboth the process and products of professional work

Acquire and maintain professional competence

Know and respect existing laws pertaining to professional work

Accept and provide appropriate professional review

Give comprehensive and thorough evaluation of computer systemsand their impacts, including analysis of possible risks

Honor contracts, agreements, and assigned responsibilities

Improve public understanding of computing and its consequences

Access computing and communication resources only whenauthorised to do so

62 / 104

Page 63: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Responsibilities

Strive to achieve the highest quality, effectiveness and dignity inboth the process and products of professional work

Acquire and maintain professional competence

Know and respect existing laws pertaining to professional work

Accept and provide appropriate professional review

Give comprehensive and thorough evaluation of computer systemsand their impacts, including analysis of possible risks

Honor contracts, agreements, and assigned responsibilities

Improve public understanding of computing and its consequences

Access computing and communication resources only whenauthorised to do so

63 / 104

Page 64: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Professional Responsibilities

Strive to achieve the highest quality, effectiveness and dignity inboth the process and products of professional work

Acquire and maintain professional competence

Know and respect existing laws pertaining to professional work

Accept and provide appropriate professional review

Give comprehensive and thorough evaluation of computer systemsand their impacts, including analysis of possible risks

Honor contracts, agreements, and assigned responsibilities

Improve public understanding of computing and its consequences

Access computing and communication resources only whenauthorised to do so

64 / 104

Page 65: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Organisational Leadership

Articulate social responsibilities of members of an organisationalunit and encourage full acceptance of those responsibilities

Manage personnel and resources to design and build informationsystems that enhance the quality of working life

Acknowledge and support proper and authorised uses of anorganisation’s computing and communication resources

Ensure that users and those who will be affected by a system havetheir needs clearly articulated during the assessment and design ofrequirements; later the system must be validated to meet thoserequirements

Articulate and support policies that protect the dignity of users andothers affected by a computing system

Create opportunities for members of the organisation to learn theprinciples and limitations of computer systems

65 / 104

Page 66: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Organisational Leadership

Articulate social responsibilities of members of an organisationalunit and encourage full acceptance of those responsibilities

Manage personnel and resources to design and build informationsystems that enhance the quality of working life

Acknowledge and support proper and authorised uses of anorganisation’s computing and communication resources

Ensure that users and those who will be affected by a system havetheir needs clearly articulated during the assessment and design ofrequirements; later the system must be validated to meet thoserequirements

Articulate and support policies that protect the dignity of users andothers affected by a computing system

Create opportunities for members of the organisation to learn theprinciples and limitations of computer systems

66 / 104

Page 67: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Organisational Leadership

Articulate social responsibilities of members of an organisationalunit and encourage full acceptance of those responsibilities

Manage personnel and resources to design and build informationsystems that enhance the quality of working life

Acknowledge and support proper and authorised uses of anorganisation’s computing and communication resources

Ensure that users and those who will be affected by a system havetheir needs clearly articulated during the assessment and design ofrequirements; later the system must be validated to meet thoserequirements

Articulate and support policies that protect the dignity of users andothers affected by a computing system

Create opportunities for members of the organisation to learn theprinciples and limitations of computer systems

67 / 104

Page 68: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Organisational Leadership

Articulate social responsibilities of members of an organisationalunit and encourage full acceptance of those responsibilities

Manage personnel and resources to design and build informationsystems that enhance the quality of working life

Acknowledge and support proper and authorised uses of anorganisation’s computing and communication resources

Ensure that users and those who will be affected by a system havetheir needs clearly articulated during the assessment and design ofrequirements; later the system must be validated to meet thoserequirements

Articulate and support policies that protect the dignity of users andothers affected by a computing system

Create opportunities for members of the organisation to learn theprinciples and limitations of computer systems

68 / 104

Page 69: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Organisational Leadership

Articulate social responsibilities of members of an organisationalunit and encourage full acceptance of those responsibilities

Manage personnel and resources to design and build informationsystems that enhance the quality of working life

Acknowledge and support proper and authorised uses of anorganisation’s computing and communication resources

Ensure that users and those who will be affected by a system havetheir needs clearly articulated during the assessment and design ofrequirements; later the system must be validated to meet thoserequirements

Articulate and support policies that protect the dignity of users andothers affected by a computing system

Create opportunities for members of the organisation to learn theprinciples and limitations of computer systems

69 / 104

Page 70: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Organisational Leadership

Articulate social responsibilities of members of an organisationalunit and encourage full acceptance of those responsibilities

Manage personnel and resources to design and build informationsystems that enhance the quality of working life

Acknowledge and support proper and authorised uses of anorganisation’s computing and communication resources

Ensure that users and those who will be affected by a system havetheir needs clearly articulated during the assessment and design ofrequirements; later the system must be validated to meet thoserequirements

Articulate and support policies that protect the dignity of users andothers affected by a computing system

Create opportunities for members of the organisation to learn theprinciples and limitations of computer systems

70 / 104

Page 71: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Compliance with the Code

Uphold and promote the principles of this code

Treat violations of this code as inconsistent with membership in theACM

71 / 104

Page 72: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

72 / 104

Page 73: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

73 / 104

Page 74: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

74 / 104

Page 75: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

75 / 104

Page 76: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

76 / 104

Page 77: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

77 / 104

Page 78: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

78 / 104

Page 79: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

79 / 104

Page 80: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

80 / 104

Page 81: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards and Standardisation

Standards are written agreements on some technical matter thatseeks to ensure that what is governed is fit for purpose

In information technology, standards deal withProtocols

Data formats

(Programming) LanguagesSyntax

Semantics

Technical aspects

(Proper) standards are devised by standards organisations

Proprietary ‘standards’ are typically devised by companies andaccepted due to the company’s market power

81 / 104

Page 82: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Standards Organisations

ISO — International Standards Organisationhttp://www.iso.org/

ANSI — American National Standards Institutehttp://www.ansi.org/

CEN — Comitte Europeen de Normalisationhttp://www.cenorm.be/cenorm/

BSI — British Standards Institutehttp://www.bsonline.bsi-global.com

IETF — Internet Engineering Task Forcehttp://www.ietf.org/

ITU — International Telecommunication Unionhttp://www.itu.int/home/

82 / 104

Page 83: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ISO: International Standards Organisation

A federation of national standards bodies from some 130 countries

Non-governmental

Established in 1947

ISO’s missionTo promote the development of standardisation and relatedactivities in the world with a view to facilitating the internationalexchange of goods and services, and to developing cooperationin the spheres of intellectual, scientific, technological andeconomic activity

ISO’s work results in international agreements which are publishedas International Standards

Among those are standards for programming languages (C, C++,Ada) and processes (quality assurance ISO 9001)

83 / 104

Page 84: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ISO: International Standards Organisation

A federation of national standards bodies from some 130 countries

Non-governmental

Established in 1947

ISO’s missionTo promote the development of standardisation and relatedactivities in the world with a view to facilitating the internationalexchange of goods and services, and to developing cooperationin the spheres of intellectual, scientific, technological andeconomic activity

ISO’s work results in international agreements which are publishedas International Standards

Among those are standards for programming languages (C, C++,Ada) and processes (quality assurance ISO 9001)

84 / 104

Page 85: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ISO: International Standards Organisation

A federation of national standards bodies from some 130 countries

Non-governmental

Established in 1947

ISO’s missionTo promote the development of standardisation and relatedactivities in the world with a view to facilitating the internationalexchange of goods and services, and to developing cooperationin the spheres of intellectual, scientific, technological andeconomic activity

ISO’s work results in international agreements which are publishedas International Standards

Among those are standards for programming languages (C, C++,Ada) and processes (quality assurance ISO 9001)

85 / 104

Page 86: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ISO: International Standards Organisation

A federation of national standards bodies from some 130 countries

Non-governmental

Established in 1947

ISO’s missionTo promote the development of standardisation and relatedactivities in the world with a view to facilitating the internationalexchange of goods and services, and to developing cooperationin the spheres of intellectual, scientific, technological andeconomic activity

ISO’s work results in international agreements which are publishedas International Standards

Among those are standards for programming languages (C, C++,Ada) and processes (quality assurance ISO 9001)

86 / 104

Page 87: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ISO: International Standards Organisation

A federation of national standards bodies from some 130 countries

Non-governmental

Established in 1947

ISO’s missionTo promote the development of standardisation and relatedactivities in the world with a view to facilitating the internationalexchange of goods and services, and to developing cooperationin the spheres of intellectual, scientific, technological andeconomic activity

ISO’s work results in international agreements which are publishedas International Standards

Among those are standards for programming languages (C, C++,Ada) and processes (quality assurance ISO 9001)

87 / 104

Page 88: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ISO: International Standards Organisation

A federation of national standards bodies from some 130 countries

Non-governmental

Established in 1947

ISO’s missionTo promote the development of standardisation and relatedactivities in the world with a view to facilitating the internationalexchange of goods and services, and to developing cooperationin the spheres of intellectual, scientific, technological andeconomic activity

ISO’s work results in international agreements which are publishedas International Standards

Among those are standards for programming languages (C, C++,Ada) and processes (quality assurance ISO 9001)

88 / 104

Page 89: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ISO: International Standards Organisation

A federation of national standards bodies from some 130 countries

Non-governmental

Established in 1947

ISO’s missionTo promote the development of standardisation and relatedactivities in the world with a view to facilitating the internationalexchange of goods and services, and to developing cooperationin the spheres of intellectual, scientific, technological andeconomic activity

ISO’s work results in international agreements which are publishedas International Standards

Among those are standards for programming languages (C, C++,Ada) and processes (quality assurance ISO 9001)

89 / 104

Page 90: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

IETF: Internet Engineering Task Force

International community of network designers, operators, vendors,and researchers; open to any interested individual

First IETF meeting was held in 1986

IETF’s missionThe mission of the IETF is to produce high quality, relevanttechnical and engineering documents that influence the waypeople design, use, and manage the Internet in such a way as tomake the Internet work better. These documents include protocolstandards, best current practices, and informational documents ofvarious kinds.

Every IETF standard is published as an RFC ‘Request ForComments’

90 / 104

Page 91: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

IETF: Internet Engineering Task Force

International community of network designers, operators, vendors,and researchers; open to any interested individual

First IETF meeting was held in 1986

IETF’s missionThe mission of the IETF is to produce high quality, relevanttechnical and engineering documents that influence the waypeople design, use, and manage the Internet in such a way as tomake the Internet work better. These documents include protocolstandards, best current practices, and informational documents ofvarious kinds.

Every IETF standard is published as an RFC ‘Request ForComments’

91 / 104

Page 92: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

IETF: Internet Engineering Task Force

International community of network designers, operators, vendors,and researchers; open to any interested individual

First IETF meeting was held in 1986

IETF’s missionThe mission of the IETF is to produce high quality, relevanttechnical and engineering documents that influence the waypeople design, use, and manage the Internet in such a way as tomake the Internet work better. These documents include protocolstandards, best current practices, and informational documents ofvarious kinds.

Every IETF standard is published as an RFC ‘Request ForComments’

92 / 104

Page 93: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

IETF: Internet Engineering Task Force

International community of network designers, operators, vendors,and researchers; open to any interested individual

First IETF meeting was held in 1986

IETF’s missionThe mission of the IETF is to produce high quality, relevanttechnical and engineering documents that influence the waypeople design, use, and manage the Internet in such a way as tomake the Internet work better. These documents include protocolstandards, best current practices, and informational documents ofvarious kinds.

Every IETF standard is published as an RFC ‘Request ForComments’

93 / 104

Page 94: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

IETF: Internet Engineering Task Force

International community of network designers, operators, vendors,and researchers; open to any interested individual

First IETF meeting was held in 1986

IETF’s missionThe mission of the IETF is to produce high quality, relevanttechnical and engineering documents that influence the waypeople design, use, and manage the Internet in such a way as tomake the Internet work better. These documents include protocolstandards, best current practices, and informational documents ofvarious kinds.

Every IETF standard is published as an RFC ‘Request ForComments’

94 / 104

Page 95: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ITU: International Telecommunication Union

International organisation ofmember states (189)sector members (602)e.g. phone companies, TV companies, equipment manufactures

Traces its origins back to 1865

ITU’s mission is to coordinate the operation of telecommunicationnetworks and services and advance the development ofcommunications technology

Works through conferences and meetings, where membersnegotiate the agreements which serve as the basis for the operationof global telecommunication services, based on specifications andrecommendations prepared by experts

IETF and ITU are ‘in conflict’ concerning who is responsible for thefuture of the Internet and related communications technology

95 / 104

Page 96: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ITU: International Telecommunication Union

International organisation ofmember states (189)sector members (602)e.g. phone companies, TV companies, equipment manufactures

Traces its origins back to 1865

ITU’s mission is to coordinate the operation of telecommunicationnetworks and services and advance the development ofcommunications technology

Works through conferences and meetings, where membersnegotiate the agreements which serve as the basis for the operationof global telecommunication services, based on specifications andrecommendations prepared by experts

IETF and ITU are ‘in conflict’ concerning who is responsible for thefuture of the Internet and related communications technology

96 / 104

Page 97: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ITU: International Telecommunication Union

International organisation ofmember states (189)sector members (602)e.g. phone companies, TV companies, equipment manufactures

Traces its origins back to 1865

ITU’s mission is to coordinate the operation of telecommunicationnetworks and services and advance the development ofcommunications technology

Works through conferences and meetings, where membersnegotiate the agreements which serve as the basis for the operationof global telecommunication services, based on specifications andrecommendations prepared by experts

IETF and ITU are ‘in conflict’ concerning who is responsible for thefuture of the Internet and related communications technology

97 / 104

Page 98: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ITU: International Telecommunication Union

International organisation ofmember states (189)sector members (602)e.g. phone companies, TV companies, equipment manufactures

Traces its origins back to 1865

ITU’s mission is to coordinate the operation of telecommunicationnetworks and services and advance the development ofcommunications technology

Works through conferences and meetings, where membersnegotiate the agreements which serve as the basis for the operationof global telecommunication services, based on specifications andrecommendations prepared by experts

IETF and ITU are ‘in conflict’ concerning who is responsible for thefuture of the Internet and related communications technology

98 / 104

Page 99: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ITU: International Telecommunication Union

International organisation ofmember states (189)sector members (602)e.g. phone companies, TV companies, equipment manufactures

Traces its origins back to 1865

ITU’s mission is to coordinate the operation of telecommunicationnetworks and services and advance the development ofcommunications technology

Works through conferences and meetings, where membersnegotiate the agreements which serve as the basis for the operationof global telecommunication services, based on specifications andrecommendations prepared by experts

IETF and ITU are ‘in conflict’ concerning who is responsible for thefuture of the Internet and related communications technology

99 / 104

Page 100: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

ITU: International Telecommunication Union

International organisation ofmember states (189)sector members (602)e.g. phone companies, TV companies, equipment manufactures

Traces its origins back to 1865

ITU’s mission is to coordinate the operation of telecommunicationnetworks and services and advance the development ofcommunications technology

Works through conferences and meetings, where membersnegotiate the agreements which serve as the basis for the operationof global telecommunication services, based on specifications andrecommendations prepared by experts

IETF and ITU are ‘in conflict’ concerning who is responsible for thefuture of the Internet and related communications technology

100 / 104

Page 101: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Enforcement of standards

Some standards are enshrined in (national) laws and regulations mainly measurements and safety standards enforcement overseen by standards organisation or

other (government) organisations, and the legal systemExamples: ‘Kilogram’, ‘Metre’, ‘Class 1 banana’

Proprietary ‘standards’ as well as standards devised bystandards organisations can be enforced using trademarksExample: ‘Java’ and ‘Wi-Fi’ are both trademarks

Products (Java Virtual Machines, Wireless devices)have to pass compliance tests before vendors areallowed to use these trademarks

101 / 104

Page 102: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Enforcement of standards

Some standards are enshrined in (national) laws and regulations mainly measurements and safety standards enforcement overseen by standards organisation or

other (government) organisations, and the legal systemExamples: ‘Kilogram’, ‘Metre’, ‘Class 1 banana’

Proprietary ‘standards’ as well as standards devised bystandards organisations can be enforced using trademarksExample: ‘Java’ and ‘Wi-Fi’ are both trademarks

Products (Java Virtual Machines, Wireless devices)have to pass compliance tests before vendors areallowed to use these trademarks

102 / 104

Page 103: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Enforcement of standards

Some standards are enforced by the requirement for interoperabilityin the marketExample: An e-mail client that does not correctly implement

RFC 2821 (Simple Mail Transfer Protocol) andRFC 3501 (IMAP) will not succeed in the market

Enforcement is often only partialExample:SQL is standardisedCurrently SQL:2011 (ISO/IEC 9075(1-4,9-11,13,14):2011)Vendors (Oracle, Microsoft) implementa ‘superset of a subset’ of SQL:2008 (precursor of SQL:2011)in their SQL server products

A lot of standards are not enforced

103 / 104

Page 104: COMP 516 Research Methods in Computer Sciencedominik/teaching/oldcomp516/... · 2012-11-29 · COMP 516 Research Methods in Computer Science Lecture 19: Legal, Social, Ethical and

Enforcement of standards

Some standards are enforced by the requirement for interoperabilityin the marketExample: An e-mail client that does not correctly implement

RFC 2821 (Simple Mail Transfer Protocol) andRFC 3501 (IMAP) will not succeed in the market

Enforcement is often only partialExample:SQL is standardisedCurrently SQL:2011 (ISO/IEC 9075(1-4,9-11,13,14):2011)Vendors (Oracle, Microsoft) implementa ‘superset of a subset’ of SQL:2008 (precursor of SQL:2011)in their SQL server products

A lot of standards are not enforced

104 / 104