casestudyno4 bscs3a carinan esteves galve miranda panesa

25
Software Engineering Code of Ethics Softwares Adhering to & Violating the SE Code of Ethics

Upload: rastie-galve

Post on 12-Jan-2016

215 views

Category:

Documents


0 download

DESCRIPTION

Hahaha

TRANSCRIPT

Page 1: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Software Engineering Code of EthicsSoftwares Adhering to & Violating the SE Code of Ethics

Page 2: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Engineering a Software

ENGINEERING is the application of scientific, economic, social, and practical knowledge in order to invent, design, build, maintain, research, and improve structures, machines, devices, systems, materials, and processes.

SOFTWARE ENGINEERING is the study and an application of engineering to the design, development, and maintenance of software.

Page 3: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

PREAMBLE

The short version of the code summarizes aspirations at a high level of the abstraction; the clauses that are included in the full version give examples and details of how these aspirations change the way we act as software engineering professionals. Without the aspirations, the details can become legalistic and tedious; without the details, the aspirations can become high sounding but empty; together, the aspirations and the details form a cohesive code.

Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles:

Page 4: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

1. PUBLIC - software engineers shall act consistently with the public interest.

2. CLIENT AND EMPLOYER - software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest.

3. PRODUCT - software engineers shall ensure that their products and related modifications meet the highest professional standards possible.

Page 5: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

5. MANAGEMENT - software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance.

6. PROFESSION - software engineers shall advance the integrity and reputation of the profession consistent with the public interest.

7. COLLEAGUES - software engineers shall be fair to and supportive of their colleagues.

Page 6: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

8. SELF - software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.

Page 7: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Softwares Adhering to the SE Code of Ethics

1.ADOBE SYSTEMS(ADOBE PHOTOSHOP)

2.MATHWORKS(MATHLAB)

3.AUTODESK(AUTOCAD)

4.DROPBOX

5.ITUNES

Page 8: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Softwares Violating The SE Code of Ethics

1.TAIG JAILBREAK TOOL

2.YOUTUBE DOWNLOADER & INTERNET DOWNLOAD MANAGER

3.TOR BROWSER

4.WINDOWS LOADER

5.SMS BOMBER

Page 9: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Softwares Adhering to the SE Code of Ethics

Page 10: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Adobe Photoshop

An image editing software developed and manufactured by Adobe Systems Inc.

Photoshop is considered one of the leaders in photo editing software.

There have been many versions since it was first commercially released. These are CS, CS2, CS3, CS4, CS5, CS6, CC, CC 2014, and CC 2015. There’s also a version specifically designed for tablets and touchscreen devices called PS Touch.

Page 11: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

MATLAB

MATLAB is the high-level language and interactive environment used by millions of engineers and scientists worldwide.

It lets you explore and visualize ideas and collaborate across disciplines including signal and image processing, communications, control systems, and computational finance.

Page 12: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa
Page 13: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

AutoCAD

AutoCAD is a computer-aided drafting software program used for creating blueprints for buildings, bridges and computer chips.

AutoCAD is used mainly by drafters, although engineers, surveyors and architects may need to use the software from time to time.

Page 14: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Dropbox

Dropbox is a home for all your photos, docs, videos, and files.

Anything you add to Dropbox will automatically show up on all your computers, phones and even the Dropbox website — so you can access your stuff from anywhere.

Dropbox also makes it super easy to share with others.

Your stuffs in Dropbox is safe and will never be lost.

Page 15: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

iTunes

iTunes is the best way to organize and enjoy the music, movies, and TV shows you already have — and shop for the ones you want to get.

You can even tune in to free, on-demand music stations that have been totally revamped by Apple Music experts.

Page 16: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Softwares Violating the SE Code of Ethics

Page 17: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Taig Jailbreak Tool

Jailbreaking is a hack that allow users to gain access to the entire Unix filesystem. In Unix terms, this refers to changing the root of the directory tree to /.

Jailbreaking is removing Apple's restrictions on iOS devices or otherwise making modifications to the operating system that are not authorized by Apple. 

Jailbreaking is a violation of the Terms and Conditions you agreed to in order to use your iOS device.

Page 18: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Taig Jailbreak Tool Violations

1.01. Accept full responsibility for their own work.

1.02. Moderate the interests of the software engineer, the employer, the client and the users with the public good.

2.02. Not knowingly use software that is obtained or retained either illegally or unethically.

3.13. Be careful to use only accurate data derived by ethical and lawful means, and use it only in ways properly authorized.

4.02 Ensure resources are authentically approved

4.03 Only use property as authorized by the owner

4.04 Do not use illegally obtained software

5.05 Develop fair ownership agreements

Page 19: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Youtube Downloader

YouTube Downloader is a small but effective application that quickly downloads videos without any hiccups.

YouTube Terms & Conditions5.B.Content is provided to you AS IS. You may access Content for your information and personal use solely as intended through the provided functionality of the Service and as permitted under these Terms of Service. You shall not download any Content unless you see a “download” or similar link displayed by YouTube on the Service for that Content. You shall not copy, reproduce, distribute, transmit, broadcast, display, sell, license, or otherwise exploit any Content for any other purposes without the prior written consent of YouTube or the respective licensors of the Content. YouTube and its licensors reserve all rights not expressly granted in and to the Service and the Content.

Page 20: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Youtube Downloader Violations

2.02. Not knowingly use software that is obtained or retained either illegally or unethically.

2.03. Use the property of a client or employer only in ways properly authorized, and with the client's or employer's knowledge and consent.

4.02 Ensure resources are authentically approved

4.03 Only use property as authorized by the owner

4.04 Do not use illegally obtained software

5.05 Develop fair ownership agreements

Page 21: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Tor Browser

The Tor project is a non-profit organization that conducts research and development into online privacy and anonymity. 

It is designed to stop people – including government agencies and corporations – learning your location or tracking your browsing habits.

The cloak of anonymity provided by Tor makes it an attractive and powerful for criminals.

Tor can mask users' identities, but also host their websites via its "hidden services" capabilities, which mean sites can only be accessed by people on the Tor network.

This is the so-called "dark web" element.

Page 22: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Tor Browser Violations

Principle 1: PUBLIC

1.04. Disclose to appropriate persons or authorities any actual or potential danger to the user, the public, or the environment, that they reasonably believe to be associated with software or related documents.

Principle 3: PRODUCT

Principle 5: MANAGEMENT

5.03. Ensure that software engineers know the employer's policies and procedures for protecting passwords, files and information that is confidential to the employer or confidential to others.

Page 23: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Windows Loader

A tool designed to activate many Microsoft products without using genuine licenses. It may look illegal to most of people but this is a security hole in their operating system that they didn’t pay much attention to.

First released in 2009 and it’s near to 5 years now but it still works as same as before.

TeamDaz. Daz is the main developer on the team and there are 6 other members currently working with him. All of them are experts in computer programming and ethical hacking. They don’t like to reveal their privacy in public.

Page 24: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

Windows Loader Violations

1.11 Use data legitimately

2.02. Not knowingly use software that is obtained or retained either illegally or unethically.

4.02 Ensure resources are authentically approved

4.03 Only use property as authorized by the owner

6.04 Help develop an ethical environment

6.08 Be accurate and honest regarding software

Page 25: CaseStudyNo4 BSCS3A Carinan Esteves Galve Miranda Panesa

SMS Bomber/Flooder

Sends a massive amount of SMS messages to a single or multiple targets.

A big amount of SMS messages can cause a lot of inconvenience and annoyance and in some cases crash specific hardware or perform a denial of service attack on a service.