This report intends to summarize British computer society Code of Conduct and comparing it with different codes of conduct that has a significant in fact in IT profession. However Institute of Electrical and Electronics Engineers (IEEE) is important in IT profession because it dedicates in advancing technological innovation and excellence for the benefit of humanity (ieee.org, 2010). And Association for computing machinery (ACM) is also important because it is able to advance computing as a science and a profession (acm.org, 2010). Moreover, all the codes of conduct mentioned are found relevant to the case study which will be discussed in detail in the report. The report is going to describe how the professional codes of conduct comply and how it does not comply with the case study below. Furthermore, the report breaks down the strengths, weaknesses, opportunities, and threats (SWOT) analysis which talks about the strength and weakness of the case study in detail.
The report covers all the important of code of conduct in the case study and the factors that influence the strategic as well as the day-to-day operation of the case study. Finally the report’s reflective analysis explored how all the aspects of the research are conducted.
The code of conduct simply defines as a set of regulatory rules of professional conduct which has been adopted by the Board (Merritt, R. 2008).
Impact of code of conducts
Codes of Conduct have a significant impact within the IT profession. They maintain the level of professionalism and ensure that IT professionals, their employers and the public at large have a clear idea of the expected standards of the profession. For example, it is unlikely that an employer could sack an IT Professional for failing to carry out work which the employee could demonstrate was unethical in terms of a code of conduct. If an employee was sacked under these circumstances, he/she would be able to demonstrate to an Industrial Tribunal that they had adhered to the Code of Conduct while the employer had failed to do so. (sqa.org, 2010).
British computer society(BCS):- Describes the professional standards of practice relating to the contemporary multifaceted demands found in information technology (IT).It applies to members of all grades, including students and affiliates, and also non-members who offer their expertise as part of the BCS Professional Advice Register.(bcs.org,2010).
The Codes governs the personal conduct of individual members of the BCS, who are requested to notify the Society of any significant violation by another member. Any breach of the Code brought to the attention of the Society is considered under the BCS Disciplinary procedures.(bcs.org,2010)
The following are main areas that BCS covered
Duty to the Profession:- All Members of the BCS code of conduct should be able to have a wider responsibility to promote public understanding of IT – its benefits and drawbacks, encourage and support fellow members in their professional development and, where possible, provide opportunities for the professional development of new members, particularly student members and uphold the reputation and good standing of the BCS in particular.(bcs.org,2010)
Duty to Relevant Authority:- As a Member of the BCS code of conduct you should be able to avoid any situation that may give rise to a conflict of interest between you and your relevant authority.(bcs.org,2010)
Professional Competence and Integrity:- As a Member of the BCS code of conduct you shall seek to upgrade your professional knowledge and skill, and shall also maintain awareness of technological developments, procedures and standards which are relevant to your field and encourage your subordinates to do the same.(bcs.org,2010)
The Public Interest:- In your professional role you shall have regard for the public health, safety and environment, you shall have regard to the legitimate rights of third parties and conduct your professional activities without discrimination against clients or colleagues.(bcs.org,2010)
Institute of Electrical and Electronics Engineers (IEEE) code of conduct:-IEEE is one of the world’s largest professional associations dedicated to advance technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through IEEE’s highly cited publications, conferences, technology standards, and professional and educational activities. (IEEE.org, 2010).
The following are examples of the IEEE code of conduct. (IEEE.org, 2010).
To accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment. (IEEE.org,2010).
To maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations. (IEEE.org,2010).
To treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin;
To assist colleagues and co-workers in their professional development and to support them in following this code of ethics.
To reject bribery in all its forms;
Association for computing machinery ( ACM) is also one of the world’s largest educational and scientific computing society, delivers resources that advance computing as a science and a profession. ACM provides the computing field’s premier Digital Library and serves its members and the computing profession with leading-edge publications, conferences, and career resources. (ACM.org, 2010)
The following are examples of what the ACM code of conduct covers.(ACM.org,2010)
Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work.
Excellence is perhaps the most important obligation of a professional. The computing professional must strive to achieve quality and to be conscious of the serious negative consequences that may result from poor quality in a system.(ACM.org,2010)
Acquire and maintain professional competence.
Excellence depends on individuals who take responsibility for acquiring and maintaining professional competence. A professional must participate in setting standards for appropriate levels of competence, and strive to achieve those standards.(ACM.org,2010)
Know and respect existing laws pertaining to professional work.
ACM members must obey existing local, state, province, national, and international laws unless there is a compelling ethical basis not to do so. Policies and procedures of the organizations in which one participates must also be obeyed. .(ACM.org,2010)
Accept and provide appropriate professional review, quality professional work, especially in the computing profession, depends on professional reviewing and critiquing. Whenever appropriate, individual members should seek and utilize peer review as well as provide critical review of the work of others. .(ACM.org,2010)
Both the BCS and ACM are design to guide ethical decision making (7th pacific Asia Conference, 2003)
They provide little assistance in the identification and resolution of ethical dilemma as they both tends to be national in scope by increasing the complexity of international decision making for IS practitioners.
They both have to take responsibility for maintaining professional competence.
They both maintain the level of professionalism and ensure that IT professionals, their employers and the public at large have a clear idea of the expected standards of the profession.
Both the BCS and ACM are responsible for the ethical regulation of computer professionals.
Comparison between BCS and IEEE
They both improve the understanding of technology.
They both maintain and improve their technological competence.
They both assist their colleagues and co-workers in their professional.
They are both committed to improving the competitiveness between companies
Wirral is one of the Britain’s leading component manufacturers. It has over 500 branches around the world with more than 1500 staff and many business activities. All the business activities are well supported by IT systems. More over the company was earlier a family business in Ellesmere Port Cheshire in 1960s.It started as a radio and television repair business. And eventually, the company was able to set up its own manufacturing operations and began to expand into other areas that include supplying of components and assemblies for mainframe and mini computers. The company is able to submit a successful bid for government contracts for the supply of radar equipment and weapons guidance systems in 1980s. And recently submitted a bid to supply hardware component for the proposed national identity card system. Meanwhile the company now grew to accommodate its growing market with euro trailers and European motor ways.
The following are company’s business activities.
-Manufacture and assembly of components
-Engineering drawing production & maintenance
-Sales Order Processing (SOP) incorporating barcode product identification
-Purchase Order Processing (POP)
-Warehousing & Goods inward/outward
-Accounts/invoicing
-Marketing
-Quality control
-Personnel & payroll
The company most keep their customer’s data safe by referring to BCS code of conduct that states that company should have regards to the public health, safely and environment
All members of the company should seek to upgrade their skill, and shall maintain awareness of technological developments, procedures and standards. According to BCS.
All members of the company should assist their colleagues and co-workers in their professional development and to support them in following IEEE codes of ethics.
Referring to IEEE, all the members should treat fairly all people regardless of such factors as race, religion, gender, disability, age, or national origin.
The company individuals should take responsibilities for acquiring and maintaining professional competence. According to ACM.
As the company’s business activities are supported with IT system,
Fell et al. (2007, p.62) Computer Misuse act 1990 should be use in order to protect unauthorized access and data modification.
Data Protection is also applicable to the case study because it will enhance privacy protection of the data that is outsourced to third party.(Hepple et al.2000, p.1011).
If the company compliance with the above code of conducts, It will be able to maintain its level of professionalism and ensure IT standard in the company.
If the company compliance with the above code of conducts, It will help the top level management in making good decisions consistent with the safety, health and welfare of the staff of the company.
If the company compliance with the above code of conducts, the company will be able to maintain and improve their technical competence.
If the company compliance with the above code of conducts, It will be able to reject bribery in all its forms.
If the company compliance with the above code of conducts, All the members of the company will be able to obey the existing and and new laws of the company if there is any.
If the company did not comply with the above code of conducts it can cause bribery within the company or might let someone out of the company to access their customer information which can lead the company to lose their customers due to lack of good principles and rules to follow.
It can also cause the company to lose their customers when the customers realise there is no good code of conduct that will protect their interest.
Members of the company may lack professional development if the company did not comply with the code of conduct because the code of conduct will assist all the members of the company.
The members of the company can disorganise by not complying with the above code of conduct that states, to treat fairly all members regardless of race, religion, gender, disability, age or national origin.
Below is a table that shows an SWOT analysis of WCM, PRIMO-F
SWOT analysis is basically a tool that is used to measure the street and weakness of an organisation.
The following is (PRIMO-F) analysis and Strengths and weakness that will help the Wirral Company to achieve its objectives.
Strengths Weaknesses
People
The company has a good number of staffs as it has more than 1500 staffs.
People
The staffs have limited skills as they can’t provide enough information about the company.
Resources
The company has resources as it can have more than 500 branches.
Resources
Often all the resources they have third party operating on their department.
Innovation & Ideas
The company grew to accommodate its growing market.
Innovation & Ideas
The company has low creativity and Initiatives
Marketing
WCM has very good relations with its external agents who work on commission.
Marketing
The company need to enhance its marketing strategy.
Operations
WCM company is using an in house software in its day-to-day activities to achieve its objectives.
Operations
WCM need to review its objectives
Finance
WCM has Personnel/Payroll and Accounting/Invoicing.
Finance
WCM need to be monitoring account department as its operated by third party.
Technology development and
Innovation?
Global influences?
New markets, vertical, horizontal?
Niche target markets?
Geographical, export, import?
New USP’s?
Tactics: eg, surprise, major
Contracts?
Business and product development?
Political effects?
Legislative effects?
Environmental effects?
IT developments?
Competitor intentions – various?
Market demand?
New technologies, services, ideas?
Vital contracts and partners?
Sustaining internal capabilities?
12. EPISTLE ANALYSIS (rapidbi.com, 2010)
Taxes
specific to product and services
Production level
Interest rates
Currency values
Energy costs
Government policies
Politic culture
Legislation
Global political events
Alliances
Empowering people by technology
Transference of technology
Business Information secrecy.
Demographics
Major events and influences
Life style changes
Social attitudes
Corporate social image
Purchasing habits
Computing technology. development. New technologies.
Access to technology.
Develop new product
Facilities competitive advantage
Competitive regulations.
Consumer protection.
Laws apply to the computing profession.
Environmental regulations.
Global factors.
Global warming
Natural disaster.
Skills, motivations, ideas and communication
In conducting my research work I have done a lot of research in finding resources that are relevant to the case study although the case study does not have enough information, the wide research I had made has helped me to understand the basic and important of code of conduct not only to the case study but to business in general. I use several examples of case studies that are related to the case study and so many resources. The resources I used are internet, e-books, library books and lecture’s slides that are up to date, reliable, supportive, creative and accurate (CARS). Although is not all the resources that I read that I find useful to the case study but I still use them in my bibliography list. I conducted lots of research before I found resources that are relevant to my EPISTLE analysis. Therefore I made full use of resources available to me whilst writing my report which will be found in my references list.
If I were to improve my report, I will do more practical research by arranging a work experience placement in such a way that it will benefit me with good working experience. Moreover, so far with this research work I believe I will be able to suggest a good SWOT and EPISTLE analysis to a company.
Finally I will strongly recommend the Wirral Wirral Component Manufacturers Ltd (WCM) should comply with code of conducts because it will maintain its level of professionalism and ensure IT standard in the company, It will help the top level management in making good decisions consistent with the safety, health and welfare of the staff of the company and also let the members of the company to respect the company’s rules and regulations.
ACM [on line access 22nd Aug 2010] Available at http://www.acm.org/about/code-of-ethics/#sect4
Bain, D.(2004) Introduction to computer law.5th ed.United kingdom.
BCS [on line access 30th Aug 2010] Available at http://www.bcs.org/upload/pdf/conduct.pdf
Fell, J et al.(2007) IT Law: An ISEB foundation.United Kingdom
Hepple, A et al.(2000) Tort: Case and Materials.5th ed.London England.
Impact of code of conducts [on line access 7th Sept 2010] Available at http://www.sqa.org.uk/e-learning/ProfIssues03CD/page_02.htm
IEEE [on line access 2nd Sep 2010] Available at http://www.ieee.org/index.html
Merritt, R.(2008) Code of Conduct. New york.
Swot-analysis [on line access 12nd sept 2010] Available at http://www.businessballs.com/free_SWOT_analysis_template.pdf
Swot-analysis [on line access 7nd sept 2010] Available at http://rapidbi.com/created/SWOTanalysis.html
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more