casestudyno4 bscs3a carinan esteves galve miranda panesa
DESCRIPTION
HahahaTRANSCRIPT
Software Engineering Code of EthicsSoftwares Adhering to & Violating the SE Code of Ethics
Engineering a Software
ENGINEERING is the application of scientific, economic, social, and practical knowledge in order to invent, design, build, maintain, research, and improve structures, machines, devices, systems, materials, and processes.
SOFTWARE ENGINEERING is the study and an application of engineering to the design, development, and maintenance of software.
PREAMBLE
The short version of the code summarizes aspirations at a high level of the abstraction; the clauses that are included in the full version give examples and details of how these aspirations change the way we act as software engineering professionals. Without the aspirations, the details can become legalistic and tedious; without the details, the aspirations can become high sounding but empty; together, the aspirations and the details form a cohesive code.
Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles:
1. PUBLIC - software engineers shall act consistently with the public interest.
2. CLIENT AND EMPLOYER - software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest.
3. PRODUCT - software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
5. MANAGEMENT - software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance.
6. PROFESSION - software engineers shall advance the integrity and reputation of the profession consistent with the public interest.
7. COLLEAGUES - software engineers shall be fair to and supportive of their colleagues.
8. SELF - software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.
Softwares Adhering to the SE Code of Ethics
1.ADOBE SYSTEMS(ADOBE PHOTOSHOP)
2.MATHWORKS(MATHLAB)
3.AUTODESK(AUTOCAD)
4.DROPBOX
5.ITUNES
Softwares Violating The SE Code of Ethics
1.TAIG JAILBREAK TOOL
2.YOUTUBE DOWNLOADER & INTERNET DOWNLOAD MANAGER
3.TOR BROWSER
4.WINDOWS LOADER
5.SMS BOMBER
Softwares Adhering to the SE Code of Ethics
Adobe Photoshop
An image editing software developed and manufactured by Adobe Systems Inc.
Photoshop is considered one of the leaders in photo editing software.
There have been many versions since it was first commercially released. These are CS, CS2, CS3, CS4, CS5, CS6, CC, CC 2014, and CC 2015. There’s also a version specifically designed for tablets and touchscreen devices called PS Touch.
MATLAB
MATLAB is the high-level language and interactive environment used by millions of engineers and scientists worldwide.
It lets you explore and visualize ideas and collaborate across disciplines including signal and image processing, communications, control systems, and computational finance.
AutoCAD
AutoCAD is a computer-aided drafting software program used for creating blueprints for buildings, bridges and computer chips.
AutoCAD is used mainly by drafters, although engineers, surveyors and architects may need to use the software from time to time.
Dropbox
Dropbox is a home for all your photos, docs, videos, and files.
Anything you add to Dropbox will automatically show up on all your computers, phones and even the Dropbox website — so you can access your stuff from anywhere.
Dropbox also makes it super easy to share with others.
Your stuffs in Dropbox is safe and will never be lost.
iTunes
iTunes is the best way to organize and enjoy the music, movies, and TV shows you already have — and shop for the ones you want to get.
You can even tune in to free, on-demand music stations that have been totally revamped by Apple Music experts.
Softwares Violating the SE Code of Ethics
Taig Jailbreak Tool
Jailbreaking is a hack that allow users to gain access to the entire Unix filesystem. In Unix terms, this refers to changing the root of the directory tree to /.
Jailbreaking is removing Apple's restrictions on iOS devices or otherwise making modifications to the operating system that are not authorized by Apple.
Jailbreaking is a violation of the Terms and Conditions you agreed to in order to use your iOS device.
Taig Jailbreak Tool Violations
1.01. Accept full responsibility for their own work.
1.02. Moderate the interests of the software engineer, the employer, the client and the users with the public good.
2.02. Not knowingly use software that is obtained or retained either illegally or unethically.
3.13. Be careful to use only accurate data derived by ethical and lawful means, and use it only in ways properly authorized.
4.02 Ensure resources are authentically approved
4.03 Only use property as authorized by the owner
4.04 Do not use illegally obtained software
5.05 Develop fair ownership agreements
Youtube Downloader
YouTube Downloader is a small but effective application that quickly downloads videos without any hiccups.
YouTube Terms & Conditions5.B.Content is provided to you AS IS. You may access Content for your information and personal use solely as intended through the provided functionality of the Service and as permitted under these Terms of Service. You shall not download any Content unless you see a “download” or similar link displayed by YouTube on the Service for that Content. You shall not copy, reproduce, distribute, transmit, broadcast, display, sell, license, or otherwise exploit any Content for any other purposes without the prior written consent of YouTube or the respective licensors of the Content. YouTube and its licensors reserve all rights not expressly granted in and to the Service and the Content.
Youtube Downloader Violations
2.02. Not knowingly use software that is obtained or retained either illegally or unethically.
2.03. Use the property of a client or employer only in ways properly authorized, and with the client's or employer's knowledge and consent.
4.02 Ensure resources are authentically approved
4.03 Only use property as authorized by the owner
4.04 Do not use illegally obtained software
5.05 Develop fair ownership agreements
Tor Browser
The Tor project is a non-profit organization that conducts research and development into online privacy and anonymity.
It is designed to stop people – including government agencies and corporations – learning your location or tracking your browsing habits.
The cloak of anonymity provided by Tor makes it an attractive and powerful for criminals.
Tor can mask users' identities, but also host their websites via its "hidden services" capabilities, which mean sites can only be accessed by people on the Tor network.
This is the so-called "dark web" element.
Tor Browser Violations
Principle 1: PUBLIC
1.04. Disclose to appropriate persons or authorities any actual or potential danger to the user, the public, or the environment, that they reasonably believe to be associated with software or related documents.
Principle 3: PRODUCT
Principle 5: MANAGEMENT
5.03. Ensure that software engineers know the employer's policies and procedures for protecting passwords, files and information that is confidential to the employer or confidential to others.
Windows Loader
A tool designed to activate many Microsoft products without using genuine licenses. It may look illegal to most of people but this is a security hole in their operating system that they didn’t pay much attention to.
First released in 2009 and it’s near to 5 years now but it still works as same as before.
TeamDaz. Daz is the main developer on the team and there are 6 other members currently working with him. All of them are experts in computer programming and ethical hacking. They don’t like to reveal their privacy in public.
Windows Loader Violations
1.11 Use data legitimately
2.02. Not knowingly use software that is obtained or retained either illegally or unethically.
4.02 Ensure resources are authentically approved
4.03 Only use property as authorized by the owner
6.04 Help develop an ethical environment
6.08 Be accurate and honest regarding software
SMS Bomber/Flooder
Sends a massive amount of SMS messages to a single or multiple targets.
A big amount of SMS messages can cause a lot of inconvenience and annoyance and in some cases crash specific hardware or perform a denial of service attack on a service.