What does "To act responsibly, [Computing Professionals] should reflect upon the wider impacts of their work, consistently supporting the public good." mean to you? https://ethics.acm.org/ #ACMCodeofEthics #IReadTheCode
ACM Code of Ethics and Professional Conduct

ACM Code of Ethics, tech ethics, tech Hippocratic Oath, computing ethics, software ethics, programming ethics, AI ethics, computing professional, public good

ACM Ethics - The Official Site of the Association for Computing Machinery's Committee on Professional Ethics
What does "Computing professionals’ actions change the world." mean to you? https://ethics.acm.org/ #ACMCodeofEthics #IReadTheCode
ACM Code of Ethics and Professional Conduct

ACM Code of Ethics, tech ethics, tech Hippocratic Oath, computing ethics, software ethics, programming ethics, AI ethics, computing professional, public good

ACM Ethics - The Official Site of the Association for Computing Machinery's Committee on Professional Ethics
The process for reporting violations of the ACM Code of Ethics is listed at https://ethics.acm.org/enforcement/report-a-violation/ We do not address Code violations on social media. #ACMCodeofEthics #IReadTheCode
Report a Violation - ACM Ethics

Report a Violation of the ACM Code of Ethics and Professional Conduct Before submitting a report, please read over all of the material on this page. Tips for Preparing a Violation Report Familiarize yourself with the ACM Code of Ethics and Professional Conduct. Familiarize yourself with the Enforcement Policy and Procedures. Collect data, and draft

ACM Ethics - The Official Site of the Association for Computing Machinery's Committee on Professional Ethics
Kashmir Hill | Is Privacy Dead in the Age of Facial Recognition? | Jordan Harbinger

Are the benefits of facial recognition technology worth their societal cost? "Your Face Belongs to Us" author Kashmir Hill weighs the pros and cons here!

Jordan Harbinger
#ACMCodeofEthics "1.2 Avoid Harm" and "1.4 Be fair and take action not to discriminate" and "2.2 Maintain high standards of professional competence, conduct, and ethical practice" and likely "2.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks" and "3.3 Manage personnel and resources to enhance the quality of working life": https://www.statnews.com/2023/11/14/unitedhealth-algorithm-medicare-advantage-investigation/ #IReadTheCode
UnitedHealth pushed employees to follow an algorithm to cut off Medicare patients' rehab care

UnitedHealth executives pressured clinical staff to follow an algorithm to cut off patients’ rehab care, leading to coverage decisions that may violate Medicare regulations.

STAT
Another application of "1.4 Be fair and take action not to discriminate." https://staysafeonline.org/online-safety-privacy-basics/dont-blame-the-victim-fraud-shame-and-cybersecurity/ "Instead of looking at people who lose money due to online fraud as gullible marks, first remember that they are victims. At the end of the day, the person at fault is the criminal." #ACMCodeofEthics #IReadTheCode
Don't Blame the Victim: 'Fraud Shame' and Cybersecurity 

There is often a culture of blaming fraud victims for their predicament even in less obvious cybercrimes, like falling for an aggressive phone scam or clicking on a well-written phishing email. As a society, we have a strong tendency to focus on something the victim didn’t know or didn’t do, rather than focusing on the criminal and the crime.

National Cybersecurity Alliance
#ACMCodeofEthics #IReadTheCode "1.4 Be fair and take action not to discriminate." Meaningful alt text on images can help distinguish legitimate communications from criminal ones. https://www.wired.com/story/twitter-laptop-scam-hunters/ See also https://thecyberwire.com/podcasts/hacking-humans/256/notes
Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down

After scammers duped a friend with a hacked Twitter account and a “deal” on a MacBook, I enlisted the help of a fellow threat researcher to trace the criminals’ offline identities.

WIRED
Reminded again of item 3.7 in the #ACMCodeofEthics (https://ethics.acm.org/), "Recognize and take special care of systems that become integrated into the infrastructure of society" in this week's Hacking Humans podcast episode (https://thecyberwire.com/podcasts/hacking-humans/253/notes cc @bittner) that mentions a Google infrastructure-like situation. https://therecord.media/airline-customer-support-phone-number-fraud-google #IReadTheCode Thoughts?
ACM Code of Ethics and Professional Conduct

ACM Code of Ethics, tech ethics, tech Hippocratic Oath, computing ethics, software ethics, programming ethics, AI ethics, computing professional, public good

ACM Ethics - The Official Site of the Association for Computing Machinery's Committee on Professional Ethics
We are going to be doing an occasional series about the #ACMCodeofEthics (https://ethics.acm.org/). Our first conversation is inspired by the latest Hacking Humans podcast episode (https://thecyberwire.com/podcasts/hacking-humans/251/notes cc @bittner) that mentions a Facebook situation. Some have noted that services like Facebook are infrastructure-like, which brings us to item 3.7 in the Code: "Recognize and take special care of systems that become integrated into the infrastructure of society." #IReadTheCode Thoughts?