The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2008 vol.10)
pp: 35-40
Keith W. Miller , University of Illinois at Springfield
When a consumer accesses information, the consumer wants to trust that information. As computer professionals, our reputation with the public depends in large part on how the public perceives the information we deliver—if the public trusts the information, the public trusts us. This article focus on three threats to information integrity that map directly to three characteristics of information-processing professionals: incompetence, conflicts of interest, and a lack of transparency. In each case, characteristics of both individuals and the profession as a whole interact to undermine information integrity. The article concludes with strategies for improving information integrity by focusing on these three problems.
IT Pro, IT Professional, information integrity, ethics, competence, conflicts of interest, codes of ethics
Keith W. Miller, Jeffrey Voas, "Information Integrity and IT Professionals' Integrity, Intertwined", IT Professional, vol.10, no. 6, pp. 35-40, November/December 2008, doi:10.1109/MITP.2008.124
1. E. Geisler, P. Prabhaker, and M. Nayar, "Information Integrity: An Emerging Field and the State of Knowledge," Proc. Portland Int'l. Conf. Technology Management for Reshaping the World 2003 (PICMET03), Portland Int'l Ctr. for Management of Eng. and Tech., 2003, pp. 217–221.
2. D. Gotterbarn et al., Software Engineering Code of Ethics and Professional Practice (5.2), ACM and IEEE Computer Soc., 24 Apr. 2008; .
3. M. Davis, "Thinking Like an Engineer: The Place of a Code of Ethics in the Practice of a Profession," Philosophy and Public Affairs, vol. 20, no. 2, 1991, pp. 150–167.
4. L. Floridi, "Information Ethics, Its Nature and Scope," SIGCAS Computer Soc., vol. 36, no. 3, 2006, pp. 21–36.
5. D.J. Bagert et al., "Thoughts on Software Engineering Knowledge, and How to Organize It," Proc. 10th Int'l. Workshop Software Technology and Engineering Practice 2002 (STEP02), 2002, pp. 24–35.
6. W.R. Collins et al., "How Good Is Good Enough? An Ethical Analysis of Software Construction and Use," Comm. ACM, vol. 37, no. 1, 1994, pp. 81–91.
7. M.C. McFarland, "Ethics and the Safety of Computer Systems," Computer, vol. 24, no. 2, 1991, pp. 72–75.
8. G. Friedlander, "The Case of the Three Engineers vs. BART," IEEE Spectrum, Oct. 1974, pp. 69–76.
9. S.H. Unger, "The Assault on IEEE Ethics Support," IEEE Technology and Soc., vol. 18, no. 1, 1999, pp. 36–40.
10. C. Kaner, "Software Customer Bill of Rights,"24 Apr. 2008;
4 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool