The ACM case study on "Malicious Inputs to Content Filters" (ACM, N.D.) examines the case of
"Blocker Plus", a company implementing content filters to ensure compliance of educational institutions with the
Children's Internet Protection Act (CIPA). The company implemented machine learning algorithms in an attempt to avoid
the labour-intensive task of maintaining a list of keywords and websites to block. The implemented system was exploited,
resulting in content not directly failing under the CIPA provisions to be blocked. The present text will explore the
case study by comparing it with the ACM Code of Conduct (ACM, 2018), the BCS Code of Conduct (BCS, 2022) as well as the
revised CIPA (American Library Association, 2010) under the assumption that both ACM and BCS codes are binding for
the company.
With 54% of children under 13 having seen sexual content online (30% having seen sexual content online at school)
(Common Sense, 2022) and almost half of children having seen harmful content online (Weale, 2022), CIPA provides
provisions for the protection of minors while using the internet. To this extent, the act attempts to regulate
content that is taken as obscene, child pornography or content considered harmful to minors, such as nudity,
or that "lacks serious literary, artistic, political, or scientific value" (American Library Association, 2010).
The actions and omissions of the company resulted in content that is considered of "literary, artistic, political,
or scientific value" being blocked and specific groups being discriminated against. Apart from the company's moral
obligations, this also resulted in ethical violations based on the two aforementioned Codes of Conduct. Under Articles
1.2 and 1.4, ACM instructs members to "Avoid Harm" and "Be fair and take action not to discriminate". Having no access
to scientific information about vaccinations (being one the top most searched terms in 2020), the global warming effect
(being an increasingly searched term), and matters such as homosexual weddings being censored violates the two
above provisions (Google Trends, 2023).
Moreover, the company failed to adequately review the developed system, as instructed by article 2.4 of the ACM
Code of Conduct, lacked appropriate system impact evaluation as per article 2.5 and demonstrated a
lack of public information provision about the wrong filtering, possible mitigation measures and system
limitations, as per Article 2.7. At the same time, the proven system exploitation showed a lack of
appropriate risk analysis and technological measures, directly violating Article 2.9, which states,
"In cases where misuse or harm are predictable or unavoidable, the best option may be to not implement the system.",
especially when considering the refusal of the company to roll-back to the previous system used after
identifying the severe issues of the newly implemented system. The fact that the implemented system directly
impacted society and the education system, and considering the strong indications of lack of adequate
pre-implementation review, resulted in the violation of Article 3.7 as the company failed to "Recognize
and take special care of systems that become integrated into the infrastructure of society". All of the above
led directly to a violation of Article 4.1. as the company failed to uphold several vital parts of the Code,
severely impacting the education system.
Similarly, when comparing the actions and omissions of the company with the BCS Code of Conduct, we can find
several direct violations. Even though the actions of the company had to be aligned with quotation 1.a. (considering
that the company was implementing a CIPA compliance system), the company showed disregard for environmental matters
by allowing censorship of the term climate change and failed to uphold the public interest by discriminating based
on sexual orientation and gender identity. Moreover, not following CIPA provisions showed a lack of understanding
of quotation 2.d., by effectively failing to comply with the legislation, and failed to uphold the no-harm principle
as per quotation 2.f. Additionally, it showed a lack of due care, as otherwise required by article 3.a. and failed
to take responsibility for its omissions as per article 3.c. of the same.
Finally, one should consider that the Codes of Conduct mentioned above, even though binding, are not necessarily
strict legal documents, and thus, they may be open to interpretation. Similarly, CIPA can be open to interpretation
when we consider both the lawmaker's intent and the sense of justice and present norms in a society. Having said that,
even though in-home/private content filtering may not be able to be regulated, having in mind the freedom of speech
and opinion and possible internet censorship (McCarthy, 2004), it is apparent that both the actions as well as the
omissions of the company resulted in several forms of discrimination (in direct violation of article 1.4 of ACM Code
of Conduct against discrimination), and resulted in actual internet censorship, by limiting content which is of
"literary and scientific value" and thus being against the provisions of CIPA.
To sum up, the company should have taken actions to avoid discriminatory filtering by utilizing
subject-matter experts and adequate testing before releasing the machine learning models in a production
environment (Articles 1.2, 1.4, 2.4, 2.5, 2.7 of ACM Code of Conduct and Citations 2.d., 2.f of BCS Code of Conduct),
have measures in place to avoid misuse and exploitation of their system and underlying algorithms
(Article 2.9 of ACM Code of Conduct) and have fall back plans in place. Moreover, the company showed
complete and utter disregard after the issues had been identified, thus being in direct
violation of articles 3.7 and 4.1 of the ACM Code of Conduct, quotations 3.a and 3.c of the BCS Code of
Conduct and most notably with the provisions of CIPA.
Based on peers' responses
The ACM case study on "Malicious Inputs to Content Filters" (ACM, N.D.) which examines
the case of the company "Blocker Plus" and their product of web content filtering, has been analyzed in
terms of technical, ethical and legal compliance. During the said analysis (Koilakos, 2023), several
compliance issues have been found, some being legal, such as non-compliance with CIPA based on the law's
intent, and others being ethical, based both on the ACM's Code of Conduct (ACM, N.D.) and the BCS' Code
of Conduct (BCS, 2022).
Apart from the company's violations, the analysis provided mitigation recommendations,
such as utilizing subject-matter experts and testing adequately before the software's roll-out.
In addition to that, leveraging the "power of the many" is another approach during which the company
would make the algorithm and design ideas publicly available and transparent to the general audience
(or to a limited audience - to ensure that their intellectual property is safeguarded), possibly allowing
them to identify flaws early on (Kanakavelu, 2023). Another element that the company could have used is
the implementation of a risk assessment, during which they would "consider the risks of harm or misuse before
implementing the system" (Biswas, 2023).
Overall, the company showed complete and utter disregard for the possible (and actual) misuse of their system,
failed to balance the equities between automation and the public good and did not utilize any of the available
design principles or mitigation measures available to them.
Abstract
In conclusion, ethics shall be in the main picture of computing and not be considered a secondary duty.
With technology continuing to evolve, ethical dilemmas are expected to become more complex, as can also be seen
through the increased ethical concerns of every subsequent industrial revolution. Concerning data-related computing
ethics and the involvement of people with specific needs in humanitarian contexts, addressing such challenges requires
organisations and professionals to think outside of silos, and it needs a collective effort that involves ethicists,
humanitarians, policymakers, computing and data professionals as well as the population of concern. It is only through
dialogue, public consultation, strict oversight and enforcement, professionalism and commitment to upholding the
ethical principles that we can ensure that the third and fourth industrial revolutions will not be overshadowed
by harm to society and that humanity will thrive and enjoy the benefits of the innovation and prosperity that
computing has to offer.
Guiding questions to support planning, revising, and refining of a literature review as provided by the University
of Essex
Q: What is the focus and aim of your review? Who is your audience?
A: Our literature review has the subject of "How can technology be used to raise awareness on the protection of
refugees?".
Starting from the target audience, our literature review targets a broad spectrum of target groups,
mainly revolving around the general public. Other target groups include humanitarian organisations, non-governmental
organisations and human rights advocates while it aims to reach policymakers. The audience, already familiar with our
subject, shares the concern about adequately protecting refugees and upholding their rights, while they have a shared
interest in raising awareness and driving change.
As technological advancements continue changing and revolutionising various aspects of our lives, we must
explore how these innovations can be used in intersection with advocating for refugee rights. The aim of the
literature review is bi-fold: To identify and analyse the existing technological interventions that have been
and are currently used for the cause mentioned above, and, to bring together tech professionals, humanitarian
workers, and the public to collaborate on how technology can be at service of advocacy for refugee rights.
Q: Why is there a need for your review? Why is it significant?
A: Technology's rapid evolution presents challenges and opportunities for addressing global humanitarian crises.
Among these crises, the rights of refugees stand as one of the most urgent, with millions displaced in perilous
situations. Public awareness of refugee rights remains somewhat limited in many layers of society. Given the
evolution of technology, as mentioned above, and its potential benefits, the question of how technology can
raise awareness for refugees' rights emerges.
The proposed literature review is significant for various reasons, such as providing systematic
pathways and discipline-related knowledge on the use of technology for advocacy purposes and
understanding of current efforts and practices, looking into the emerging technologies which
might not have been utilised for advocacy reasons yet, despite their potential, but also highlighting associated
risks taking into consideration the sensitive nature of the population of concern, due to their legal
and physical protection status.
Q: What is the context of the topic or issue? What perspective do you take? What framework do you use to synthesise the
literature?
A: The ever-increasing number of displaced people fleeing war and persecution is one of our time's most
pressing humanitarian challenges. The context for our literature review is to provide clarity on the
intersection of technological advancements and refugee advocacy.
Our working assumption is that technology possesses the power to reshape negative narratives and raise awareness.
For this reason, we approach the literature review as an interdisciplinary topic of humanitarian interventions
and technological capability.
We follow a hybrid approach between the traditional and systematic literature review frameworks. The workflow
starts by categorising the main technological interventions (e.g. communication, virtual reality, AI, etc.)
and further analysing relevant literature in terms of theory and real-world examples with a particular
interest in advocacy usages. Through this workflow, we aim to achieve a complete understanding of the
technological usage regarding advocacy causes and, furthermore, identify gaps, opportunities and risks.
Q: How did you locate and select sources for inclusion in the review?
A: The process of locating and selecting resources for the literature review has been following both an academic
approach and an applicable-practice approach. We begin by reviewing generic information from organisations dealing
with refugee-related issues. At the same time, we search through Google Scholar for journals and other articles
for scholarly literature related to technology, advocacy and human rights.
Depending on the specific issue that we were researching (e.g. social media and advocacy, technology and ethics, etc.),
we used a combination of keywords such as "social media", "advocacy" "refugee rights", "awareness", and "risks".
Preference was given to the most recent articles and articles from academic sources. In parallel, we dived into
information provided by the UN, INGOs and technology organisations related to advocacy. Organisations such as IOM,
UNHCR and the UN have been of particular interest.
The process above ensures that the list of sources is credible. Resources were further evaluated regarding
relevance and contribution to the literature review subject. The followed methodology provided
the complete picture of the studied matter by combining followed practice, academic research,
criticality and applicability.
Q: How is your review structured?
A: The structure of this review is planned from generic to specific. Starting from generic information,
we indicate trends in technology usage to highlight its importance in everyday life, and we continue by
displaying basic metrics of displacement and the connection of technology with inequalities. Moving to
the more specific content, we connect technologies such as social media and VR with the advocacy
and awareness-raising cause while discussing specific ethical and implementation concerns.
Q: What are the main findings in the literature on this topic?
A: The literature on leveraging technology to promote awareness about refugee rights has revealed several findings.
The digital era has significantly shifted the information provision and how people learn the news,
with mainstream media being complemented, if not replaced, by social media platforms, allowing for more spherical
and worldwide dissemination of information. Moreover, virtual reality (VR) and augmented reality (AR) can be
and have been beneficial to the cause by providing firsthand experience of living within a refugee camp.
At the same time, concerns about the technology's usage are critical. Ethical concerns, especially
regarding the privacy and security of refugees, and other issues, such as audience desensitisation,
have been at the forefront of the literature review.
Q: What are the main strengths and limitations of this literature?
A: The literature review has been constructed based on the available public materials.
This leads to several strengths but also specific limitations. Some of the most critical strengths
of the literature review are the diverse perspectives presented due to the usage of several resources
from different disciplines such as the academia, UN, INGOs, and the technology sector; the presentation of real-world
applications, without limiting the review in theoretical concept; and the presentation from a forward-looking
perspective without restriction to the past or the present. Regarding limitations, the forward-looking
approach can be proven to be a double-edged sword in case the potential is overemphasised over current applications.
Additionally, there is a lack of literature discussing the long-term impact, and finally, there is an
underrepresentation of refugee-led literature.
Q: Are there any discrepancies in this literature?
A: Due to the "generic to specific" approach we have followed throughout the composition of the
literature review, and as with any other interdisciplinary field, the available literature presents
discrepancies mainly revolving around ethical consideration and technology success rate for advocacy
reasons. More specifically, a general observation is that literature tends to agree with the power of
social media but also presents the lack of sustained commitment and regular supporters. Virtual reality (VR)
and augmented reality (AR) are also fields where discrepancies are observed with focus on the benefit-risk
ratio of AR and VR applications and viewer desensitisation.
Q: What conclusions do your draw from the review? What do you argue needs to be done as an outcome of the review?
A: It is evident that technology offers powerful tools to swift the negative narratives and advocate
for refugee rights. If correctly used, digital platforms and advanced technologies such as AR and VR can educate the
public and give a path for more inclusive policymaking. This potential should be assessed regarding the population
it serves, and ethical dilemmas and challenges should be addressed. Finally, a synergistic approach must be
followed by bringing together humanitarians, policymakers, tech-industry experts and refugees to implement
appropriate campaigns.
The realm of computing, and especially the discipline of data science, has as a prerequisite the effective and
proper usage of data collection methods as a pathway to understanding the studied matter at hand.
Throughout this week's reading, there are several methods and techniques described which can be employed
by researchers to achieve their research goals and support the research results. For this reason, we
will compare the methods presented in the unit's readings and assess which are suitable for the
proposed research/dissertation based on the research questions, aims and objectives, as well
as based on the envisioned data required for the desired outcome.
Our approach will consider the technical and theoretical subject of using queuing theory in the humanitarian
context, along with its specific limitations. Starting with a generic overview, the research has a mix of
exploratory and descriptive approaches, aiming to expand existing knowledge and procedures for how queues
are utilized by directly applying findings in queuing environments through a simulation, as well as
exploring underresearched or unresearched areas of the matter at hand (Fleetwood, 2021). Considering
the vague data needs of the research (due to its nature), the ill-defined data sources, primarily
due to the uncommon, hardly accessible and sometimes unsafe environment that we explore, and issues
that might arise in access to data (Dudovskiy, 2022), a combination of data collection methodologies
will need to be utilized.
Among the various data collection methods presented in this week's reading material, and considering the research
subject particularities, it is of particular interest the use of case studies to evaluate the research subject
(Dawson, 2015; Fleetwood, 2021). Case studies will provide in-depth insight into various subject elements,
such as the studied population or applied queuing in different environments. Also, other qualitative methods,
such as one-to-one interviews with subject matter experts, will be needed. Field experts will be able to
provide insights on followed practices as well as experience-led guidance (Dawson, 2015). Text contextual
analysis on the available related literature, especially considering the diverse studied environment in terms
of culture, ethnicity, geography, religion and sex, will provide a better understanding of the challenges
of the research, as well as specific areas that the researcher should be prudent of (QuestionPro, 2021).
Additionally, despite data source and availability challenges, the research has as one of its objectives to
implement an algorithm/program that can be utilized to plan queuing activities. Considering the experimental
element of the selected research method, the developed algorithm can be used as an isolated simulation
environment to provide analytics on which algorithm works best and will thus help in deciding the final deliverable.
For this reason, primary data collection will be used in terms of algorithmic success (Dudovskiy, 2022).
Secondary data collection to compare the algorithm's success with the actual queuing times will depend on data
availability.
In conclusion, the chosen blend of data collection methods and research approaches vastly depends on the
objectives, aim and constraints of the proposed research. While the methods and approaches mentioned above
are the most appropriate at this preliminary phase of the proposal and can provide a well-rounded understanding
of the topic, the selected options might change based on the steering of the research and research-specific
challenges.
Preparation/introduction of the literature review
The world is currently facing the most significant displacement in history, with nearly
110 million forcibly displaced people, out of which more than 45 million are refugees, asylum seekers and others
in need of international protection (UNHCR, 2022). At the same time, anti-refugee rhetoric and negative perceptions
towards refugees tend to be more and more frequent, especially among the host-country population (Findor et al., 2021)
, although research argues that those opinions do not monopolize the refugee discussions (Loescher, 2021).
In an effort to shift this narrative, technology can be leveraged, primarily through the mainstream media
(having the lion's share in the public's information) (McCann et al., 2023).
As previously mentioned, some of the louder (but not necessarily numerous) public voices lobby for stricter
border policies and immigration laws. In order to shift the scale, the use of existing technologies, coupled with
technological innovation, can be used. Starting from mainstream media, the era of only-written articles is
long gone, with images and videos slowly replacing writing (Silverman, 2019). On the other hand, creative
storytelling, such as the article "A Game of Shark and Minnow" (Himmelman, 2013), is visually appealing
to the audience and can be similarly used by the mainstream media to tell the stories of refugee journeys
and relevant risks.
Journalistic tools continue beyond creative storytelling, with augmented reality being previously used
for humanitarian purposes; going back to 2004 in a United Nations documentary (Irom, 2018), one can find
several use cases, for example, showing a refugee's journey from Syria to Greece. Finally, one of the most
common technologies used nowadays, social media, having universal coverage, can further assist in shifting
anti-refugee narratives, especially if used by influential people or well-known and respected organizations
(Kent, 2018).
On the other hand, the use of technology needs to be thoroughly assessed before being used.
Technologies such as augmented reality may put at risk already vulnerable populations. For example,
cases in which augmented reality is used to sensitize the general public on the refugees' living conditions
may pose risks related to data protection (Jerome & Greenberg, 2021), such as the refugees' whereabouts,
negative coping mechanisms used, or even revealing information about their specific legal and physical
protection needs (e.g. GBV cases). Another risk may be the audience's desensitization due to overexposure,
similar to the desensitization of viewers due to overexposure to violence (Krahe et al., 2015).
To conclude, technology presents immense opportunities for raising awareness about the protection needs of
refugees, asylum seekers and people needing international protection. Leveraging technology use cases such as
augmented reality can help provide the general public with hands-on experience in the life of a refugee.
Consequently, sensitizing the public can assist in applying pressure on global leaders to take more robust
protection measures for the people in need. All of the above should be used by having the "do not harm"
principle (UNDP, 2023) in mind and ensuring that the safety of the people is not jeopardized at any step
of the process.
Abstract
Despite the exponential advancements in technology, which drive the "economic growth" (Driskell, 2022)
and help people stay connected and in spite of the social media penetration mentioned previously, social
inequalities are on the rise, suggesting that the world is moving forward in terms of technological application
metrics but backwards in terms of inequality metrics. Private wealth is rising, while public wealth has been
on a decline since 1970. Income inequalities are found to be on levels similar to those found in the early
20th century, while gender inequalities in pay are only 4% lower than in 1990 (World Inequality Report, 2022).
Other examples of untackled inequalities include the lack of access to healthcare for women and children
(United Nations, 2023), while the Gini coefficient, which measures inequality, increased from 27% in 2021
to 28% in 2022, signifying a general increase in inequalities in Ireland (Ireland Central Statistics Office, 2023).
The United Nations (2023) also reports that 20% of people have been discriminated against at least once in their
lifetime. The social injustices, despite the progress of humankind, also disproportionally affect refugees,
asylum seekers and people in need of international protection.
Researchers constantly face complex and cross-discipline ethical dilemmas while conducting
their research duties (National Research Council et al., 2005). Those challenges are becoming even more complex
in the case of paid research, where intellectual property, civil and criminal liabilities, and responsibility towards
the general public come into play. The intellectual property (IP) aspect depends on multiple factors, such as legal
agreements, the researcher's funding, and national legislation (The University of Melbourne, N.D.).
In our case study (University of Essex, 2023), we discuss the scenario of Abi, a researcher who receives funding
from Whizzz to evaluate the nutritious value of their cereal. During the research, Abi realised that the data
suggest that the nutritious value of the product is lesser than expected, and further findings suggest that the
product may even be harmful. There, Abi faces several ethical dilemmas related to using more favourable data
analysis and how his research will be used, even if Abi shows both the positive and negative aspects of his
research. The case study is analysed assuming the ordering party holds the IP rights, although the European
Commission suggest co-authorship (EC, 2005).
Undoubtedly, Abi, as a researcher, holds the primary responsibility, regardless of the ordering party's
research objective, to conduct his research duties ethically and legally. Having said that, the research
methodology must be defined beforehand (Kelley et al., 2003) and not change throughout the process to
favour any outcome. At the same time, Abi can and should conduct his research unbiasedly, so he should
favour neither the positive nor the negative findings (University of Cambridge, N.D.). This means
researching the full spectrum of the product's nutritious values and writing his report by fully disclosing all
the relevant findings.
Moreover, despite Abi not holding the IR of his work, he may be professionally and scientifically responsible
for how his research will be used based on the signed agreement between him and his funder, his contractual obligations,
the relevant institutional code of conduct and applicable legislation (EC, 2005; Valkenburg et al., 2020).
The much-needed peer review, primarily due to the implications of the research to the broader public and
the ethical implications, and professional audits shall also have a say in the research outcome
(Kelly, 2014; EC, 2005).
Another aspect is the researcher's responsibility towards the public regardless of who holds the IP rights.
For example, the French Centre of Scientific Research (2016) instructs researchers that they are ethically
obliged to make their complete research available to other researchers and the general public, while the
European Charter for Researchers (2005) suggests that the complete research should be made available to the
general public and the ordering party as applicable and adequately exploited. This needs to be further assessed
due to complex underlying legal implications.
In summary, regardless of the ordering party's objectives, the searcher holds the primary responsibility
to conduct his duties ethically and legally. This means the full findings shall be disclosed, whether favourable
or not for the ordering entity. No data alteration or misrepresentation shall occur. The researcher can also employ
the available tools to seek advice (e.g. through an appropriate ethics committee or a professional body's ethicist)
or even refuse to accept the assignment on the grounds of upholding ethical standards. Finally, the proper
exploitation of the results falls under the researcher's responsibilities (EC, 2005).
Based on peers' responses
Researchers frequently face complex ethical challenges, especially in paid research, including but not limited to legal liabilities, public responsibility, and intellectual property (IP) rights.
These challenges are influenced by various factors such as funding sources and legal agreements, national laws, and professional practices and ethics enforced by professional bodies
(National Research Council et al., 2005; The University of Melbourne, N.D.).
A case study from the University of Essex (2023) presents such challenges and ethical dilemmas by introducing Abi, a researcher funded by Whizzz to assess the nutritional value of their cereal.
Abi's research results indicate that the product's nutritional value is below the expected, and some ingredients are potentially harmful. The ethical and legal dilemma revolves around data representation,
findings communication and its subsequent usage.
First, regardless of the funder's intentions, Abi's primary responsibility as a researcher is to execute his research ethically, without bias and prejudice and present both positive and negative results.
The research methodology should be predetermined (Kelley et al., 2003), ensuring no shifts in approach to favour any desired outcomes (University of Cambridge, N.D.). Although Abi might not possess the IP rights,
and despite the fact that the European Commission (2005) suggest co-authorship of researches, he remains professionally accountable for the research's application. Institutional guidelines further influence this
accountability, along with the researcher's legal agreement with the funder and relevant laws (EC, 2005; Valkenburg et al., 2020). Peer reviews and professional audits also significantly impact research outcomes
(Kelly, 2014; EC, 2005).
Furthermore, researchers must share their findings with the public, irrespective of IP ownership. For instance, the French Centre of Scientific Research (2016) states that researchers must
provide their research to peers and the public. Similarly, the European Charter for Researchers (2005) recommends sharing the complete research with the public and relevant stakeholders.
Finally, as a professional practice, Abi should take into consideration elements related to data protection, especially for data received by the funder or produced during the research
that qualify as personal or sensitive data, and, at the same time, ensure that the primary data, which they are the cornerstone of the analysis, are verified in terms of accuracy and reliability (Jabbal, 2023).
In a nutshell, irrespective of a funder's goals, researchers must ethically and legally uphold their responsibilities. This means fully disclosing all results without bias or alteration. In case of doubt,
they can seek ethical advice or decline projects to uphold these standards. Properly using and sharing research results is also of paramount importance to ensure that the public interest is satisfied (EC, 2005).
Abstract
Following a similar approach, our research proposal aims to understand how queues work in other disciplines,
how computing can provide value in the utilisation and optimisation of queues, and how queues can be used in humanitarian
contexts in complex environments for registration and assistance delivery activities. By answering this subset of
questions, we aim to showcase how the widely used concept of queues can use the computing and data analysis
disciplines to assist the humanitarian field with the problem of reducing waiting times for populations in
perilous situations and apply proper prioritisation by using the technology and computing concepts in a
reproducible and usable manner. This technological intervention can potentially assist more than 108
million displaced people worldwide (UNHCR, 2023).
Abstract
Hypothesis Testing and Summary Measures & Chart Worksheets and Analysis (View embedded)
Competency | Essex Graduate | Skill | Skill Level |
---|---|---|---|
Professional | Literacy, Communication, Language Skills | Express information effectively to technical and non-technical audiences | Proficient |
Create documents to aid your communication (reports, diagrams, legal descriptions, plans, manuals and charts) | Expert | ||
Commercial Awareness | Keep current with tools of the industry, as well as emerging technology | Trained | |
Seek opportunites to improve and share knowledge of tools and technoology that may improve productivity | Proficient | ||
Participate in scientific and professional organisations | Trained | ||
Emphasise quality, customer satisfaction and fair application of policies | Proficient | ||
Demonstrate familiriaty with codes of conduct for the Computing field | Trained | ||
Subject understanding, research, critical thinking, time management | Critically analyse complex ideas in concepts in the field of Computer Science | Trained | |
Recognise inconsistencies and gaps in information, and search for additional information when needed | Proficient | ||
Explore complex real-world problems in a Computing context | Trained | ||
Legal and Ethical | Ethical Awareness | Comply with the letter and spirit of applicable laws | Proficient |
Maintain privacy and confidentiality of company, co-worker and customer information | Expert | ||
Social (inc. Teamwork) | Cultural Awareness | Act in the best interest of the community at large - Social (Community) Responsibility | Proficient |
Teamwork, Leadership and Resilience, Time Management | Collaborate effectively in diverse teams to achieve team goals | Expert | |
Meeting team objectives using teamwork skills | Proficient | ||
Demonstrate skills in leadership and team building | Trained | ||
Give and receive constructive feedback | Trained | ||
Creativity, Entrepreneurial, Problem solving, Initiative, Decision Making | Create, discuss and deliver strategies for sustainability for all stakeholders (company, community and environment) | Trained | |
Able to make a decision on a complex matter/scenario using multiple sources of information | Trained | ||
Technical (Data Science) | IT and Digital, Numeracy | SQL for database querying | Proficient |
Python | Proficient | ||
Java | Trained | ||
noSQL | Aware | ||
R | Trained | ||
Gits - repository development and maintenance | Trained | ||
Use of conferenceing technologies and Moodle (VLE) | Proficient | ||
Use of Word Processing tools and Spreadsheets | Expert | ||
Effective use of e-library resources | Proficient | ||
Subject Application | Global Citizen, Teamwork, Leadership, Emotional Intelligence | Take into account other people's perspectives | Trained |
Work constructively with differences in viewpoints | Trained | ||
Actively participate in a range of community activities as an informed citizen | Trained | ||
Decision Making, Initiative, Emotional Intelligence, Ethical Awareness | Develop, articulate and clarify your personal values and ethics | Trained |
Abstract
Throughout this module, I explored and familiarised myself with different research methodologies,
ethical considerations in computing, and academic professional practices. Due to limited pre-existing knowledge,
I faced challenges in understanding research concepts. Succeeding units introduced hands-on literature review and
research proposal presentation, data collection methods, and statistical approaches, which improved my understanding.
The final units, emphasizing research writing and project management, shaped my future plans. Throughout the module,
collaboration with peers has also been beneficial, while logistical challenges mainly related to conflicting priorities
hindered my performance. Overall, this module improved my research capabilities and helped me find a passion
for paper writing, which I aim to pursue in the future.