⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ch17.htm

📁 美国Macmillan出版社编写的Perl教程《Perl CGI Web Pages for WINNT》
💻 HTM
📖 第 1 页 / 共 3 页
字号:
descriptions and alternatives. Computer professionals are in a

position of special trust, and therefore have a special responsibility

to provide objective, credible evaluations to employers, clients,

users, and the public. When providing evaluations the professional

must also identify any relevant conflicts of interest, as stated

in imperative 1.3.

<P>

As noted in the discussion of principle 1.2 on avoiding harm,

any signs of danger from systems must be reported to those who

have opportunity and/or responsibility to resolve them. See the

guidelines for imperative 1.2 for more details concerning harm,

including the reporting of professional violations.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>2.6</TD><TD>Honor contracts, agreements, and assigned responsibilities.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Honoring one's commitments is a matter of integrity and honesty.

For the computer professional this includes ensuring that system

elements perform as intended. Also, when one contracts for work

with another party, one has an obligation to keep that party properly

informed about progress toward completing that work.

<P>

A computing professional has a responsibility to request a change

in any assignment that he or she feels cannot be completed as

defined. Only after serious consideration and with full disclosure

of risks and concerns to the employer or client, should one accept

the assignment. The major underlying principle here is the obligation

to accept personal accountability for professional work. On some

occasions other ethical principles may take greater priority.

<P>

A judgment that a specific assignment should not be performed

may not be accepted. Having clearly identified one's concerns

and reasons for that judgment, but failing to procure a change

in that assignment, one may yet be obligated, by contract or by

law, to proceed as directed. The computing professional's ethical

judgment should be the final guide in deciding whether or not

to proceed. Regardless of the decision, one must accept the responsibility

for the consequences.

<P>

However, performing assignments &quot;against one's own judgment&quot;

does not relieve the professional of responsibility for any negative

consequences. 

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>2.7</TD><TD>Improve public understanding of computing and its consequences.

</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Computing professionals have a responsibility to share technical

knowledge with the public by encouraging understanding of computing,

including the impacts of computer systems and their limitations.

This imperative implies an obligation to counter any false views

related to computing.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>2.8</TD><TD>Access computing and communication resources only when

authorized to do so.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Theft or destruction of tangible and electronic property is prohibited

by imperative 1.2-&quot;Avoid harm to others.&quot; Trespassing

and unauthorized use of a computer or communication system is

addressed by this imperative. Trespassing includes accessing communication

networks and computer systems, or accounts and/or files associated

with those systems, without explicit authorization to do so. Individuals

and organizations have the right to restrict access to their systems

so long as they do not violate the discrimination principle (see

1.4). No one should enter or use another's computer system, software,

or data files without permission. One must always have appropriate

approval before using system resources, including .rm57 communication

ports, file space, other system peripherals, and computer time.

<H3><A NAME="ORGANIZATIONALLEADERSHIPIMPERATIVES2">

3. ORGANIZATIONAL LEADERSHIP IMPERATIVES</A></H3>

<P>

As an ACM member and an organizational leader, I will...

<P>

(BACKGROUND NOTE:This section draws extensively from the draft

IFIP Code of Ethics, especially its sections on organizational

ethics and international concerns. The ethical obligations of

organizations tend to be neglected in most codes of professional

conduct, perhaps because these codes are written from the perspective

of the individual member. This dilemma is addressed by stating

these imperatives from the perspective of the organizational leader.

In this context&quot;leader&quot; is viewed as any organizational

member who has leadership or educational responsibilities. These

imperatives generally may apply to organizations as well as their

leaders. In this context &quot;organizations&quot; are corporations,

government agencies, and other &quot;employers,&quot; as well

as volunteer professional organizations.)

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>3.1</TD><TD>Articulate social responsibilities of members of an organizational

unit and encourage full acceptance of those responsibilities.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Because organizations of all kinds have impacts on the public,

they must accept responsibilities to society. Organizational procedures

and attitudes oriented toward quality and the welfare of society

will reduce harm to members of the public, thereby serving public

interest and fulfilling social responsibility. Therefore, organizational

leaders must encourage full participation in meeting social responsibilities

as well as quality performance. 

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>3.2</TD><TD>Manage personnel and resources to design and build information

systems that enhance the quality of working life. </TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Organizational leaders are responsible for ensuring that computer

systems enhance, not degrade, the quality of working life.  When

implementing a computer system, organizations must consider the

personal and professional development, physical safety, and human

dignity of all workers. Appropriate human-computer ergonomic standards

should be considered in system design and in the workplace. 

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>3.3</TD><TD>Acknowledge and support proper and authorized uses of an organization's

computing and communication resources. </TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Because computer systems can become tools to harm as well as to

benefit an organization, the leadership has the responsibility

to clearly define appropriate and inappropriate uses of organizational

computing resources. While the number and scope of such rules

should be minimal, they should be fully enforced when established.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>3.4</TD><TD>Ensure that users and those who will be affected by a system

have their needs clearly articulated during the assessment and

design of requirements; later the system must be validated to

meet requirements.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Current system users, potential users and other persons whose

lives may be affected by a system must have their needs assessed

and incorporated in the statement of requirements. System validation

should ensure compliance with those requirements.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>3.5</TD><TD>Articulate and support policies that protect the dignity of

users and others effected by a computing system. </TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Designing or implementing systems that deliberately or inadvertently

demean individuals or groups is ethically unacceptable. Computer

professionals who are in decision making positions should verify

that systems are designed and implemented to protect personal

privacy and enhance personal dignity. 

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>3.6</TD><TD>Create opportunities for members of the organization to learn

the principles and limitations of computer systems.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

This complements the imperative on public understanding (2.7).

Educational opportunities are essential to facilitate optimal

participation of all organizational members. Opportunities must

be available to all members to help them improve their knowledge

and skills in computing, including courses that familiarize them

with the consequences and limitations of particular types of systems.

In particular, professionals must be made aware of the dangers

of building systems around oversimplified models, the improbability

of anticipating and designing for every possible operating condition,

and other issues related to the complexity of this profession.

<H3><A NAME="COMPLIANCEWITHTHECODE2">

4.  COMPLIANCE WITH THE CODE</A></H3>

<P>

As an ACM member I will...

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>4.1</TD><TD>Uphold and promote the principles of this Code.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

The future of the computing profession depends on both technical

and ethical excellence. Not only is it important for ACM computing

professionals to adhere to the principles expressed in this Code,

each member should encourage and support adherence by other members.

<P>

<BLOCKQUOTE>

<TABLE>

<TR VALIGN=TOP><TD WIDTH=30>4.2</TD><TD>Treat violations of this code as inconsistent with membership

in the ACM.</TD></TR>

</TABLE>

</BLOCKQUOTE>

<P>

Adherence of professionals to a code of ethics is largely a voluntary

matter. However, if a member does not follow this code by engaging

in gross misconduct, membership in ACM may be terminated.

<P>

This Code and the supplemental Guidelines were developed by the

Task Force for the Revision of the ACM Code of Ethics and Professional

Conduct: Ronald E. Anderson, Chair, Gerald Engel, Donald Gotterbarn,

Grace C. Hertlein, Alex Hoffman, Bruce Jawer, Deborah G. Johnson,

Doris K. Lidtke, Joyce Currie Little, Dianne Martin, Donn B. Parker,

Judith A. Perrolle, and Richard S. Rosenberg. The Task Force was

organized by ACM/SIGCAS and funding was provided by the ACM SIG

Discretionary Fund.  This Code and the supplemental Guidelines

were adopted by the ACM Council on October 16, 1992.

<HR>



<CENTER><P><A HREF="ch16.htm" tppabs="http://210.32.137.15/ebook/PC%20Magazine%20Programming%20Perl%205.0%20CGI%20Web%20Pages%20for%20Microsoft%20Windows%20NT/ch16.htm"><IMG SRC="PC.GIF" tppabs="http://210.32.137.15/ebook/PC%20Magazine%20Programming%20Perl%205.0%20CGI%20Web%20Pages%20for%20Microsoft%20Windows%20NT/PC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A>

<A HREF="#CONTENTS"><IMG SRC="CC.GIF" tppabs="http://210.32.137.15/ebook/PC%20Magazine%20Programming%20Perl%205.0%20CGI%20Web%20Pages%20for%20Microsoft%20Windows%20NT/CC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A>

<A HREF="contents.htm" tppabs="http://210.32.137.15/ebook/PC%20Magazine%20Programming%20Perl%205.0%20CGI%20Web%20Pages%20for%20Microsoft%20Windows%20NT/contents.htm"><IMG SRC="HB.GIF" tppabs="http://210.32.137.15/ebook/PC%20Magazine%20Programming%20Perl%205.0%20CGI%20Web%20Pages%20for%20Microsoft%20Windows%20NT/HB.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A>

<A HREF="ch18.htm" tppabs="http://210.32.137.15/ebook/PC%20Magazine%20Programming%20Perl%205.0%20CGI%20Web%20Pages%20for%20Microsoft%20Windows%20NT/ch18.htm"><IMG SRC="NC.GIF" tppabs="http://210.32.137.15/ebook/PC%20Magazine%20Programming%20Perl%205.0%20CGI%20Web%20Pages%20for%20Microsoft%20Windows%20NT/NC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A>

<HR WIDTH="100%"></P></CENTER>

</BODY>

</HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -