ACM Case Study Question

  1. Does the ACM help to write digital laws?
  2. How often does the ACM update its code?
  3. How should one speak up when facing unethical situations in a company? In most of the examples, they had to resign or were removed from the company.
  4. Is it okay to violate your own ToS for the greater public good? Isn’t that being dishonest (Like in case of Rogue)?
  5. Suppose we look at coworker’s source code for ideas and then completely write our own program; would we still have an obligation to give credit?
  6. In the medical implant risk case, would Corazón’s failure to fix the problem that the researchers found be a violation of the code since it could result in death?
  7. How is the code helpful for programmers who have superiors that willingly violate the code.
  8. What is the line drawn between normal “environment pressure” you have to deal with and flat-out abuse, as shown in the Abusive Workplace Behavior example?
  9. If machine learning methods constantly needed human intervention, as shown in the Malicious Inputs case, or in the case of the Tay bot built by Microsoft, is it worth the effort to deploy machine learning methods?
  10. What are the consequences of violating the ACM code of ethics?
  11. How is compliance with the ACM code of ethics monitored?
  12. In the case where workers break their confidentiality agreement and got sued, is it possible that a judge would rule in favor of the workers because the company was not acting ethically?
  13. Is there any authority or group that actively looks for things like dark UX patterns, or is it always up to programmers to call that out? Do users have any power in such a situation?
  14. Can there be legal actions for things that occurred in these case studies?
  15. Software engineers are tech savvy by nature. How can we be sure that these interfaces are as intuitive for us as they are for those who are less technologically gifted?
  16. What are the risks of breaking an ethics code and getting away with it?
  17. What are real life examples of big data companies breaking ethics code such as the Automated Active Response Weaponry example with privacy of the user rights. 
  18. Put yourself in the shoes of Diane, how would you react to the response to your manager regarding the abusive work environment? What would you do next?
  19. Where is the bottom line to take decisive action against the unhealthy work environment?
  20. Have you ever been misled by dark UX patterns?
  21. Are there any consequences/repercussions for the companies using dark UX patterns?
  22. The fourth case study talks about how development of technology that can be used to kill is against the ACM code. Are there any examples where developing such technology would be ethically justified (according to the code at least)?
  23. Does the ACM code of ethics apply to military technological developments at all?
  24. Can we talk a little more about identity theft – such as phishing, pretexting, and other social engineering attacks – and how they violate the ACM Code? I found the topic of Dark UX quite intriguing. 
  25. Why are the CC cameras you see on the road not violating other people’s privacy? They are also capturing videos of several innocent people and their faces are being recorded without their attention. Is only the government allowed to do that?
  26. What can we learn from each cases?
  27. What can we do to avoid repeating the same mistakes from the perspective of the parties in the case?
  28. In the case of Block Plus, would disclosing the compromise of the system be a good idea? Considering that it might cause confusion from its users that might cause overreactions like limiting students’ computer access in general, or disabling the automatic censorship tool.
  29. In the case of the abusive team leader, what could be the employee’s plan of action for the future?
  30. How would you best combat toxic culture in a workplace that doesn’t necessarily adhere to the ACM Code?
  31. How do we easily identify things like dark UX patterns and who do we notify (or can we?)?
Scroll to Top