Beyond outlaws, hackers and pirates

Editor's note: This article was written to introduce Part VIII of Computerization and Controversy: Value Conflicts and Social Choices (2 "d ed.), edited by Rob Kling. Copyright © 1996, by Academic Press, Inc., reprinted here by permission with minor modifications. As Rob and I were discussing its publication here, he called my attention to the section titled Codes Of Professional Ethics and Conduct (p.8). As I re-read the article, I began to understand his suggestion that there is--at the very least--a real communications gap between: 1) the developers o f the A C M Code (who have invested enormous amounts of time and energy in it), 2) the AC M membership department staff(who don't even send new members a copy o f the Code, let alone ask them to sign an agreement to comply with it), and 3) whatever Code enforcement procedure there is (which Rob argues is essentially nonexistent). What do you think? What role should SIGCAS play in the future of the Code? What is the future of the Code? How can it--how should it--be enforced? How can the A C M build commitment among its members to abide by its Code o f Ethics? Let's start a dialog on this issue (email sigcas@engr, csulb, edu--we 'll publish as many responses as possible). --T.J.

[1]  Lucy Suchman,et al.  Supporting Articulation Work , 1995, Computerization and Controversy, 2nd Ed..

[2]  John Ladd,et al.  Corporate Mythology and Individual Responsibility , 1984 .

[3]  Ben Shneiderman,et al.  The Durango Declarations Forum , 1996, Inf. Soc..

[4]  Marilyn M. Helms,et al.  Poor Quality Products: Is their Production Unethical? , 1992 .

[5]  Rob Kling,et al.  Computerization and controversy (2nd ed.): value conflicts and social choices , 1995 .

[6]  Bo Dahlbom,et al.  Power in Systems Design , 1996, Computerization and Controversy, 2nd Ed..

[7]  Rob Kling,et al.  Computer abuse and computer crime as organizational activities , 1981, CSOC.

[8]  Lucy A. Suchman Suporting Articulation Work: Aspects of a Feminist Practice of Technology Production , 1994, Woman, Work and Computerization.

[9]  J. Kotter,et al.  Corporate Culture and Performance , 1992 .

[10]  Diana E. Forsythe,et al.  The Construction of Work in Artificial Intelligence , 1993 .

[11]  Andrew Clement,et al.  Computing at work: empowering action by “low-level users” , 1994, CACM.

[12]  S. Hawk The effects of computerized performance monitoring: An ethical perspective , 1994 .

[13]  Rob Kling,et al.  Can Computer Science Solve Organizational Problems? The Case for Organizational Informatics , 1995, Computerization and Controversy, 2nd Ed..

[14]  Thomas A. Peters,et al.  Computerization and Controversy: Value Conflicts and Social Choices (2nd Ed.), edited by Rob Kling , 1996, Journal of the American Society for Information Science.

[15]  W. Gale Cutler What Future Engineers and Scientists Learn About Ethics , 1992 .

[16]  Donald Gotterbarn,et al.  Using the new ACM code of ethics in decision making , 1993, CACM.

[17]  E. Oz Ethical standards for computer professionals: A comparative analysis of four major codes , 1993 .

[18]  Ina Wagner,et al.  A web of fuzzy problems: confronting the ethical issues , 1993, CACM.

[19]  T. Peters Computerization and Controversy: Value Conflicts and Social Choices (2nd Ed.), edited by Rob Kling , 1996, J. Am. Soc. Inf. Sci..

[20]  Edward Wenk New Principles for Engineering Ethics , 1996, Computerization and Controversy, 2nd Ed..

[21]  Effy Oz,et al.  Ethical Standards for Information Systems Professionals: A Case for a Unified Code , 1992, MIS Q..

[22]  Helen Nissenbaum,et al.  Computing and accountability , 1994, CACM.

[23]  Stuart H. Zweben ACM Computing Week '95 , 1995, CACM.

[24]  OzEffy Ethical standards for information systems professionals , 1992 .

[25]  Gary T. Marx,et al.  The Case of the Omniscient Organization , 1995, Computerization and Controversy, 2nd Ed..

[26]  Tony Horowitz Mr. Edens Profits from Watching His Workers' Every Move , 1996, Computerization and Controversy, 2nd Ed..

[27]  Rob Kling,et al.  Fair information practices with computer supported cooperative work , 1993, SIGO.

[28]  Batya Friedman,et al.  Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..

[29]  Keith W. Miller,et al.  How good is good enough?: an ethical analysis of software construction and use , 1994, CACM.

[30]  Helen Z. Margetts,et al.  Computerization and Controversy: Value Conflicts and Social Choices , 1993, J. Inf. Technol..

[31]  Michael D. Bayles,et al.  Right Conduct: Theories and Applications , 1988 .

[32]  John McAuley,et al.  Exploring Issues in Culture and Competence , 1994 .

[33]  Jonathan Jacky,et al.  Safety-Critical Computing: Hazards, Practices, Standards, and Regulation , 1991, Computerization and Controversy, 2nd Ed..

[34]  Katie Hafner,et al.  Cyberpunk: Outlaws and Hackers on the Computer Frontier , 1991 .

[35]  Robert Jackall,et al.  Moral mazes: The world of corporate managers , 1989 .

[36]  Ann Rudinow Sætnan,et al.  Rigid Politics and Technological Flexibility: The Anatomy of a Failed Hospital Innovation , 1991 .