This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Information Integrity and IT Professionals' Integrity, Intertwined
November/December 2008 (vol. 10 no. 6)
pp. 35-40
Keith W. Miller, University of Illinois at Springfield
When a consumer accesses information, the consumer wants to trust that information. As computer professionals, our reputation with the public depends in large part on how the public perceives the information we deliver—if the public trusts the information, the public trusts us. This article focus on three threats to information integrity that map directly to three characteristics of information-processing professionals: incompetence, conflicts of interest, and a lack of transparency. In each case, characteristics of both individuals and the profession as a whole interact to undermine information integrity. The article concludes with strategies for improving information integrity by focusing on these three problems.

1. E. Geisler, P. Prabhaker, and M. Nayar, "Information Integrity: An Emerging Field and the State of Knowledge," Proc. Portland Int'l. Conf. Technology Management for Reshaping the World 2003 (PICMET03), Portland Int'l Ctr. for Management of Eng. and Tech., 2003, pp. 217–221.
2. D. Gotterbarn et al., Software Engineering Code of Ethics and Professional Practice (5.2), ACM and IEEE Computer Soc., 24 Apr. 2008; http://seeri.etsu.edu/CodesTheSECode.htm .
3. M. Davis, "Thinking Like an Engineer: The Place of a Code of Ethics in the Practice of a Profession," Philosophy and Public Affairs, vol. 20, no. 2, 1991, pp. 150–167.
4. L. Floridi, "Information Ethics, Its Nature and Scope," SIGCAS Computer Soc., vol. 36, no. 3, 2006, pp. 21–36.
5. D.J. Bagert et al., "Thoughts on Software Engineering Knowledge, and How to Organize It," Proc. 10th Int'l. Workshop Software Technology and Engineering Practice 2002 (STEP02), 2002, pp. 24–35.
6. W.R. Collins et al., "How Good Is Good Enough? An Ethical Analysis of Software Construction and Use," Comm. ACM, vol. 37, no. 1, 1994, pp. 81–91.
7. M.C. McFarland, "Ethics and the Safety of Computer Systems," Computer, vol. 24, no. 2, 1991, pp. 72–75.
8. G. Friedlander, "The Case of the Three Engineers vs. BART," IEEE Spectrum, Oct. 1974, pp. 69–76.
9. S.H. Unger, "The Assault on IEEE Ethics Support," IEEE Technology and Soc., vol. 18, no. 1, 1999, pp. 36–40.
10. C. Kaner, "Software Customer Bill of Rights,"24 Apr. 2008; www.satisfice.com/kaner?p=8.
1. K.D. Stephan, "Notes for a History of the IEEE Society on Social Implications of Technology," IEEE Technology and Soc., vol. 25, no. 4, 2006, pp. 5–14.
2. "IEEE-SSIT Barus Award Presented to Former Deepwater Project Engineer Michael Dekort," IEEE Technology and Soc., vol. 27, no. 1, 2008, pp. 7–12.
3. M.C. Mcfarland, "Standards—Ethics and the Safety of Computer Systems," Computer, vol. 24, no. 2, 1991, pp. 72–75.
4. W.J. Frey and J.A. Cruz-Cruz, "Work in Progress—The Ethics Across the Curriculum Toolkit: An Online Environment for Ethics Resources," Proc. IEEE Frontiers in Education Conf. 2007 (FIE 07), IEEE CS Press, 2007, pp. S4H-9–S4H-10.

Index Terms:
IT Pro, IT Professional, information integrity, ethics, competence, conflicts of interest, codes of ethics
Citation:
Keith W. Miller, Jeffrey Voas, "Information Integrity and IT Professionals' Integrity, Intertwined," IT Professional, vol. 10, no. 6, pp. 35-40, Nov.-Dec. 2008, doi:10.1109/MITP.2008.124
Usage of this product signifies your acceptance of the Terms of Use.