Comparison Between BCS And ACM

This report intends to summarize British computer society Code of Conduct and comparing it with different codes of conduct that has a significant in fact in IT profession. However Institute of Electrical and Electronics Engineers (IEEE) is important in IT profession because it dedicates in advancing technological innovation and excellence for the benefit of humanity (ieee.org, 2010). And Association for computing machinery (ACM) is also important because it is able to advance computing as a science and a profession (acm.org, 2010). Moreover, all the codes of conduct mentioned are found relevant to the case study which will be discussed in detail in the report. The report is going to describe how the professional codes of conduct comply and how it does not comply with the case study below. Furthermore, the report breaks down the strengths, weaknesses, opportunities, and threats (SWOT) analysis which talks about the strength and weakness of the case study in detail.

The report covers all the important of code of conduct in the case study and the factors that influence the strategic as well as the day-to-day operation of the case study. Finally the report’s reflective analysis explored how all the aspects of the research are conducted.

Code of conduct

The code of conduct simply defines as a set of regulatory rules of professional conduct which has been adopted by the Board (Merritt, R. 2008).

Impact of code of conducts

Codes of Conduct have a significant impact within the IT profession. They maintain the level of professionalism and ensure that IT professionals, their employers and the public at large have a clear idea of the expected standards of the profession. For example, it is unlikely that an employer could sack an IT Professional for failing to carry out work which the employee could demonstrate was unethical in terms of a code of conduct. If an employee was sacked under these circumstances, he/she would be able to demonstrate to an Industrial Tribunal that they had adhered to the Code of Conduct while the employer had failed to do so. (sqa.org, 2010).

British computer society(BCS):- Describes the professional standards of practice relating to the contemporary multifaceted demands found in information technology (IT).It applies to members of all grades, including students and affiliates, and also non-members who offer their expertise as part of the BCS Professional Advice Register.(bcs.org,2010).

The Codes governs the personal conduct of individual members of the BCS, who are requested to notify the Society of any significant violation by another member. Any breach of the Code brought to the attention of the Society is considered under the BCS Disciplinary procedures.(bcs.org,2010)

The following are main areas that BCS covered

Duty to the Profession:- All Members of the BCS code of conduct should be able to have a wider responsibility to promote public understanding of IT – its benefits and drawbacks, encourage and support fellow members in their professional development and, where possible, provide opportunities for the professional development of new members, particularly student members and uphold the reputation and good standing of the BCS in particular.(bcs.org,2010)

Duty to Relevant Authority:- As a Member of the BCS code of conduct you should be able to avoid any situation that may give rise to a conflict of interest between you and your relevant authority.(bcs.org,2010)

Professional Competence and Integrity:- As a Member of the BCS code of conduct you shall seek to upgrade your professional knowledge and skill, and shall also maintain awareness of technological developments, procedures and standards which are relevant to your field and encourage your subordinates to do the same.(bcs.org,2010)

The Public Interest:- In your professional role you shall have regard for the public health, safety and environment, you shall have regard to the legitimate rights of third parties and conduct your professional activities without discrimination against clients or colleagues.(bcs.org,2010)

Institute of Electrical and Electronics Engineers (IEEE) code of conduct:-IEEE is one of the world’s largest professional associations dedicated to advance technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through IEEE’s highly cited publications, conferences, technology standards, and professional and educational activities. (IEEE.org, 2010).

The following are examples of the IEEE code of conduct. (IEEE.org, 2010).

To accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment. (IEEE.org,2010).

To maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations. (IEEE.org,2010).

To treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin;

To assist colleagues and co-workers in their professional development and to support them in following this code of ethics.

To reject bribery in all its forms;

Association for computing machinery ( ACM) is also one of the world’s largest educational and scientific computing society, delivers resources that advance computing as a science and a profession. ACM provides the computing field’s premier Digital Library and serves its members and the computing profession with leading-edge publications, conferences, and career resources. (ACM.org, 2010)

The following are examples of what the ACM code of conduct covers.(ACM.org,2010)

Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work.

Excellence is perhaps the most important obligation of a professional. The computing professional must strive to achieve quality and to be conscious of the serious negative consequences that may result from poor quality in a system.(ACM.org,2010)

Acquire and maintain professional competence.

Excellence depends on individuals who take responsibility for acquiring and maintaining professional competence. A professional must participate in setting standards for appropriate levels of competence, and strive to achieve those standards.(ACM.org,2010)

Know and respect existing laws pertaining to professional work.

ACM members must obey existing local, state, province, national, and international laws unless there is a compelling ethical basis not to do so. Policies and procedures of the organizations in which one participates must also be obeyed. .(ACM.org,2010)

Accept and provide appropriate professional review, quality professional work, especially in the computing profession, depends on professional reviewing and critiquing. Whenever appropriate, individual members should seek and utilize peer review as well as provide critical review of the work of others. .(ACM.org,2010)

Comparison between BCS and ACM.

Both the BCS and ACM are design to guide ethical decision making (7th pacific Asia Conference, 2003)

They provide little assistance in the identification and resolution of ethical dilemma as they both tends to be national in scope by increasing the complexity of international decision making for IS practitioners.

They both have to take responsibility for maintaining professional competence.

They both maintain the level of professionalism and ensure that IT professionals, their employers and the public at large have a clear idea of the expected standards of the profession.

Both the BCS and ACM are responsible for the ethical regulation of computer professionals.

Comparison between BCS and IEEE

They both improve the understanding of technology.

They both maintain and improve their technological competence.

They both assist their colleagues and co-workers in their professional.

They are both committed to improving the competitiveness between companies

Case study

Wirral is one of the Britain’s leading component manufacturers. It has over 500 branches around the world with more than 1500 staff and many business activities. All the business activities are well supported by IT systems. More over the company was earlier a family business in Ellesmere Port Cheshire in 1960s.It started as a radio and television repair business. And eventually, the company was able to set up its own manufacturing operations and began to expand into other areas that include supplying of components and assemblies for mainframe and mini computers. The company is able to submit a successful bid for government contracts for the supply of radar equipment and weapons guidance systems in 1980s. And recently submitted a bid to supply hardware component for the proposed national identity card system. Meanwhile the company now grew to accommodate its growing market with euro trailers and European motor ways.

The following are company’s business activities.

-Manufacture and assembly of components

-Engineering drawing production & maintenance

-Sales Order Processing (SOP) incorporating barcode product identification

-Purchase Order Processing (POP)

-Warehousing & Goods inward/outward

-Accounts/invoicing

-Marketing

-Quality control

-Personnel & payroll

Applications of code of conducts

The company most keep their customer’s data safe by referring to BCS code of conduct that states that company should have regards to the public health, safely and environment

All members of the company should seek to upgrade their skill, and shall maintain awareness of technological developments, procedures and standards. According to BCS.

All members of the company should assist their colleagues and co-workers in their professional development and to support them in following IEEE codes of ethics.

Referring to IEEE, all the members should treat fairly all people regardless of such factors as race, religion, gender, disability, age, or national origin.

The company individuals should take responsibilities for acquiring and maintaining professional competence. According to ACM.

As the company’s business activities are supported with IT system,

Fell et al. (2007, p.62) Computer Misuse act 1990 should be use in order to protect unauthorized access and data modification.

Data Protection is also applicable to the case study because it will enhance privacy protection of the data that is outsourced to third party.(Hepple et al.2000, p.1011).

Compliance and Noncompliance.

Compliance

If the company compliance with the above code of conducts, It will be able to maintain its level of professionalism and ensure IT standard in the company.

If the company compliance with the above code of conducts, It will help the top level management in making good decisions consistent with the safety, health and welfare of the staff of the company.

If the company compliance with the above code of conducts, the company will be able to maintain and improve their technical competence.

If the company compliance with the above code of conducts, It will be able to reject bribery in all its forms.

If the company compliance with the above code of conducts, All the members of the company will be able to obey the existing and and new laws of the company if there is any.

Noncompliance

If the company did not comply with the above code of conducts it can cause bribery within the company or might let someone out of the company to access their customer information which can lead the company to lose their customers due to lack of good principles and rules to follow.

It can also cause the company to lose their customers when the customers realise there is no good code of conduct that will protect their interest.

Members of the company may lack professional development if the company did not comply with the code of conduct because the code of conduct will assist all the members of the company.

The members of the company can disorganise by not complying with the above code of conduct that states, to treat fairly all members regardless of race, religion, gender, disability, age or national origin.

Exploration of the legal, ethical and social factors of Wirral Company.

Below is a table that shows an SWOT analysis of WCM, PRIMO-F

SWOT analysis is basically a tool that is used to measure the street and weakness of an organisation.

The following is (PRIMO-F) analysis and Strengths and weakness that will help the Wirral Company to achieve its objectives.

Strengths Weaknesses

People

The company has a good number of staffs as it has more than 1500 staffs.

People

The staffs have limited skills as they can’t provide enough information about the company.

Resources

The company has resources as it can have more than 500 branches.

Resources

Often all the resources they have third party operating on their department.

Innovation & Ideas

The company grew to accommodate its growing market.

Innovation & Ideas

The company has low creativity and Initiatives

Marketing

WCM has very good relations with its external agents who work on commission.

Marketing

The company need to enhance its marketing strategy.

Operations

WCM company is using an in house software in its day-to-day activities to achieve its objectives.

Operations

WCM need to review its objectives

Finance

WCM has Personnel/Payroll and Accounting/Invoicing.

Finance

WCM need to be monitoring account department as its operated by third party.

Opportunities

Threats

Technology development and

Innovation?

Global influences?

New markets, vertical, horizontal?

Niche target markets?

Geographical, export, import?

New USP’s?

Tactics: eg, surprise, major

Contracts?

Business and product development?

Political effects?

Legislative effects?

Environmental effects?

IT developments?

Competitor intentions – various?

Market demand?

New technologies, services, ideas?

Vital contracts and partners?

Sustaining internal capabilities?

12. EPISTLE ANALYSIS (rapidbi.com, 2010)

Economic

Taxes

specific to product and services

Production level

Interest rates

Currency values

Energy costs

Political

Government policies

Politic culture

Legislation

Global political events

Alliances

Information

Empowering people by technology

Transference of technology

Business Information secrecy.

Social

Demographics

Major events and influences

Life style changes

Social attitudes

Corporate social image

Purchasing habits

Technological

Computing technology. development. New technologies.

Access to technology.

Develop new product

Facilities competitive advantage

Legal

Competitive regulations.

Consumer protection.

Laws apply to the computing profession.

Environment

Environmental regulations.

Global factors.

Global warming

Natural disaster.

People

Skills, motivations, ideas and communication

REFLECTIVE ANALYSIS

In conducting my research work I have done a lot of research in finding resources that are relevant to the case study although the case study does not have enough information, the wide research I had made has helped me to understand the basic and important of code of conduct not only to the case study but to business in general. I use several examples of case studies that are related to the case study and so many resources. The resources I used are internet, e-books, library books and lecture’s slides that are up to date, reliable, supportive, creative and accurate (CARS). Although is not all the resources that I read that I find useful to the case study but I still use them in my bibliography list. I conducted lots of research before I found resources that are relevant to my EPISTLE analysis. Therefore I made full use of resources available to me whilst writing my report which will be found in my references list.

If I were to improve my report, I will do more practical research by arranging a work experience placement in such a way that it will benefit me with good working experience. Moreover, so far with this research work I believe I will be able to suggest a good SWOT and EPISTLE analysis to a company.

Finally I will strongly recommend the Wirral Wirral Component Manufacturers Ltd (WCM) should comply with code of conducts because it will maintain its level of professionalism and ensure IT standard in the company, It will help the top level management in making good decisions consistent with the safety, health and welfare of the staff of the company and also let the members of the company to respect the company’s rules and regulations.

REFERENCES

ACM [on line access 22nd Aug 2010] Available at http://www.acm.org/about/code-of-ethics/#sect4

Bain, D.(2004) Introduction to computer law.5th ed.United kingdom.

BCS [on line access 30th Aug 2010] Available at http://www.bcs.org/upload/pdf/conduct.pdf

Fell, J et al.(2007) IT Law: An ISEB foundation.United Kingdom

Hepple, A et al.(2000) Tort: Case and Materials.5th ed.London England.

Impact of code of conducts [on line access 7th Sept 2010] Available at http://www.sqa.org.uk/e-learning/ProfIssues03CD/page_02.htm

IEEE [on line access 2nd Sep 2010] Available at http://www.ieee.org/index.html

Merritt, R.(2008) Code of Conduct. New york.

Swot-analysis [on line access 12nd sept 2010] Available at http://www.businessballs.com/free_SWOT_analysis_template.pdf

Swot-analysis [on line access 7nd sept 2010] Available at http://rapidbi.com/created/SWOTanalysis.html

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more