190 likes | 841 Views
Engineering Ethics and Professionalism . Students read information on the following topics regarding ethics and professionalism:Science, Engineering, and TechnologyThe Engineering ProfessionEngineering EthicsCodes and StandardsLegal Aspects of Engineering. Engineering Ethics and Professionalism Quiz.
E N D
3. Engineering Ethics and Professionalism Quiz Mathematics is…
The work of an engineer is to…
The formal training for electronic technicians is…
Engineers need a strong background in math and science because…
4. The purpose of science is to…
The science of greatest importance for electrical and computer engineers is…
The flow information in technological development is…
The scientific method is…
5. Technology is…
A “sound engineer” generally performs the function of …
Determine if the following employment characteristics are more likely to refer to professionals or nonprofessionals.
6. USU Computer & InformationLiteracy TestAll information taken from Utah State University website on the CIL exam http://cil.usu.edu/tests/ET/index.html All students in the university are required to take this test.
The competencies for the tests are:
1. Correctly identify the definitions of the relationship between ethics and laws.
2. Demonstrate a general understanding of copyright and license law regarding software, database contents, Internet publications, and other published materials.
3. Demonstrate understanding of ethics related to citing Internet information resources (i.e. plagiarism).
4. Correctly identify the appropriate role and typical contents of an acceptable use policy (AUP) for the computers in an organization.
5. Demonstrate understanding of computer users’ rights and duty regarding of privacy, accuracy, property, and accessibility, specifically including the following issues: harassment, fraud, negligence, plagiarism, spamming, trolling and flaming.
7. Ethics vs. Laws Ethics are the rules of right and wrong behavior.
Ethics are based on principles and values.
Ethics usually fall into three categories – professional, social and individual.
You must have an inner sense of what is moral to be able to apply ethics in specific situations.
Utah State University’s Code of Ethics
http://www.usu.edu/~stuserv/SCode/
8. Copyright Copyright is defined as the rights possessed by the author of a work.
Copyright not only covers work by an author, artist, or composer, but also a computer programmer.
The copyright law currently in effect is the federal Digital Millennium Copyright Act (DMCA).
Any software or data created with a computer is owned by its creator and is automatically copyrighted as soon as it’s in any tangible form.
It is important to note that when a corporate employer hires someone to develop a program for the company, this is known as “work made for hire.” Under this legal doctrine the employer (the corporation) owns the copyright and the employee forfeits all rights.
9. Software Licensing License agreements are contracts between the user and copyright owner.
Although licenses vary widely in content, there are five general kinds as far as copyright protection goes:
1. Public domain – not protected
2. Freeware license – licensed to be copied and distributed without charge
3. Shareware license – owner stipulates a purchase fee for permanent use
4. Open Source or Free Software – refers to availability of source code
5. Software license with all rights reserved – licensed only for use by purchasers
10. Citing Information Intellectual property is the result of intellectual activities in the arts, science and industry and as such is the property of the creator.
Quoting and citing information is just as important with computer sources as with tradition written works.
When using intellectual property, it should be used in the context originally intended and presented correctly so the meaning is not changed from the original intent.
Properly citing works can often cover the legal issues when done correctly.
11. Acceptable Use Policy Most educational institutions have a document that governs the use of the computers and networks owned by the institution.
Institutions have the following three categories defining rights and responsibilities in using equipment in a legal and ethical manner.
1. Personal computer files
2. Personal and private information
3. Ethical conduct
12. Privacy Public information is assumed to be available for use without permission.
Private information cannot be legally used without permission from its owner.
Information is owned by the person it describes, not by the organization that gathers the information.
The balance between public and private information has never been easy to keep, and in recent decades it has swung decidedly toward publication rather than privacy.
13. Harassment E-mail can be used as a productive tool for communicating and sharing information.
Examples of inappropriate e-mail uses are as follows:
1. Spamming
2. Flaming
3. Trolling
4. Phishing
Message that continue after the recipient asks that they stop are defined as a nuisance and are illegal.
It is interesting to note that nuisances and harassment are defined by the receiver of the message, not the sender.
14. Example Test Questions Which of the following is the most accurate statement?
True/False. Software licenses sometimes contain different rights for certain groups of users than for others.
Which of the following software licenses allows a user to install and run software without paying for it, but does not allow others to make changes to the software without the copyright holder’s permission?
15. A copyright…
The terms of a software license include items such as…
Which of the following is the principle that governs ownership of copyright when an employee designs or creates intellectual property as part of their work duties?
Failing to cite your sources when using an idea or other portion of a work created by someone else is…
Which of the following is not usually specified by an Acceptable Use Polciy?
16. ______________is unethical activity where a person sends or posts messages intended to provoke someone else into reacting.
Copyright is enforceable on intellectual property once a person has________________.
True/False. Address, phone number, university classes, debts and judgments against you, and police reports involving you are all examples of public information.
17. Contemporary IssuesAdministered to students on-line through WebCT.
18. Contemporary Issues in Engineering