软件工程与计算II-23-软件工程职业基础

23-软件工程职业基础

1. 软件工程职业的出现

1.1. 美国软件开发与维护人员分布 [Jones2006]

2.4.2. SWEBOK V3增加的5个知识领域

2.13. 对职业道德规范的需要

软件工程与计算II-23-软件工程职业基础
  1. 发现了重要的安全缺陷
  2. 谁也不要 告,不然职业生涯可能就没了
  3. 万事开头难

2.13.1. Scenario 1 场景一

  1. Jean, a statistical database programmer, is trying to write a large statistical program needed by her company. Programmers in this company are encouraged to write about their work and to publish their algorithms in professional journals. After months of tedious programming, Jean has found herself stuck on several parts of the program. Her manager not recognizing the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Jean remembers that a coworker had given her source listings from his current work and from an early version of a commercial software package developed at another company. On studying these programs, she sees two areas of code which could be directly incorporated into her own program. She uses segments of code from both her coworker and the commercial software, but does not tell anyone or mention it in the documentation. She completes the project and turns it in a day ahead of time.
  2. 直接使用github和商用软件等等

2.13.2. Scenario 2

  1. Three years ago Diane started her own consulting business. She has been so successful that she now has several people working for her and has many clients. Their consulting work included advising on how to network microcomputers, designing database management systems, and advising about security.
  2. Presently she is designing a database management system for the personnel office of a medium-sized company. Diane has involved the client in the design process, informing the CEO, the directory of computing, and the director of personnel about the progress of the system. Diane has described several options to the client. Because the system is going to cost more than they planned, the client has decided to opt for a less secure system. She believes the information they will be storing is extremely sensitive. It will include performance evaluations, medical records for filing insurance claims, salaries, and so forth.
  3. With weak security, employees working on microcomputers may be able to figure out ways to get access to this data, not to mention the possibilities for on-line access from hackers. Diane feels strongly that the system should be much more secure. She has tried to explain the risks, but the CEO, director of computing and director of personnel all agree that less security will do. What should she dohould she refuse to build the system as they requestli>
  4. 成本太高,降低安全性拉低成本的操作li>

2.13.3. Scenario 3

  1. Max works in a large state department of alcoholism and drug abuse. The agency administers programs for individuals with alcohol and drug problems, and maintains a huge database of information on the clients who use their services. Some of the data files contain the names and current addresses of clients.
  2. Max has been asked to take a look at the track records of the treatment programs. He is to put together a report that contains the number of clients seen in each program each month for the past five years, length of each client’s treatment, number of clients who return after completion of a program, criminal histories of clients, and so on. In order to put together this report, Max has been given access to all files in the agency’s mainframe computer. After assembling the data into a new file that includes the client names, he downloads it to the computer in his office.
  3. Under pressure to get the report finished by the deadline, Max decides he will have to work at home over the weekend in order to finish on time. He copies the information onto several disks and takes them home. After finishing the report he leaves the disks at home and forgets about them.
  4. 忘记了拷贝的副本,不允许软件源码和客户信息的拷贝

2.13.4. Scenario 4

  1. In determining requirements for an information system to be used in an employment agency, the client explains that, when displaying applicants whose qualifications appear to match those required for a particular job, the names of white applicants are to be displayed ahead of those of nonwhite applicants, and names of male applicants are to be displayed ahead of those of female applicants.

3. 道德案例

  1. 虚拟世界的案件
    1. Facebook
      1. 好友行为的广播
      2. 广告
      3. 信息是否可以被招聘、法律等目的所利用
    2. 招聘时候去调查应聘者的SNS 站
    3. 给老年人RFID芯片的皮下植入

4. History

  1. IEEE Board of Governors established steering committee (May, 1993).
  2. ACM Council endorsed Commission on Software Engineering (Late 1993).
  3. Joint steering committee established by both societies (January, 1994).

5. Joint Commission Steering Committee

  1. 4 goals:
    1. Adopt standard definitions.
    2. Define required body of knowledge and recommended practices.
    3. Define ethical standards.
    4. Define educational curricula for undergraduate, graduate (Masters), and continuing education (for retraining and migration).
  2. 3 initial task forces:
    1. Software engineering body of knowledge and recommended practices.
    2. Software engineering ethics and professional practices.
    3. Software engineering curriculum.

6. Research

  1. Review of available computing and engineering codes:
    1. The American Association of Engineering Societies
    2. Accreditation Board for Engineering Technology ? ACM’s Code of Ethics for Professional Conduct
    3. The British Computer Society Code of Practice
    4. Institute for the Certification of Computing Professionals
    5. Engineer’s Council for Professional Development
    6. The IEEE Code of Ethics
    7. National Society of Professional Engineers Code of Ethics
    8. Project Management Institute Code of Ethics

7. Brief History Timeline

  1. January 1994 – International Task Force formed the Software Engineering Ethics and Professional Practice (SEEPP).
  2. July 1997 – Initial version shown to professional societies including ACM’s SIGSOFT.
  3. November 1997 – Version 3 published in IEEE-CS and ACM magazines.
  4. Version 4 presented to IEEE review process.
  5. October 1998 – Version 5.2 unanimously adopted by ACM and IEEE.

8. 职业道德规范

  1. 详见PPT

8.2. 客户和雇主

8.3. 产品

8.4. 判断

8.5. 管理

8.6. 专业

8.7. 同行

8.8. 自身

声明:本站部分文章及图片源自用户投稿,如本站任何资料有侵权请您尽早请联系jinwei@zod.com.cn进行处理,非常感谢!

上一篇 2022年2月8日
下一篇 2022年2月8日

相关推荐